target audience: TECH SUPPLIER  Publication date: Oct 2023 - Document type: IDC Survey Spotlight - Doc  Document number: # US51284423

Does the Source of the Ransomware Initial Compromise Relate to the Successful Destruction of the Backups by the Attacker?

By: 

  • Frank Dickson Loading
  • Jennifer Glenn Loading

Content

  • 2 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

Abstract


This IDC Survey Spotlight looks at the source of the ransomware initial compromise related to the successful destruction of the backups by the attacker.

IDC has seen across its ransomware studies over time that attackers are increasingly likely to attack backup files and delete or destroy them. Successfully attacking backups is hard though; "smash and grab" techniques don't work well. Attackers need to be sophisticated and patient to be successful. Higher-value targets are more likely to motivate attackers to invest the time to successfully delete or destroy the backups. It makes sense then that more sophisticated attack techniques would correlate with successful backup deletion.



Coverage


Do you have questions about this document
or available subscriptions?