Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Threat Update 51 – LockBit and Insider Threats for Hire

1 min read
Published August 16, 2021
Last updated October 21, 2021

Organizations face threats from all sides – both external attackers trying to get in, and internal “trusted” employees going rogue.

It was only a matter of time before these two forces combined. The attackers and associates behind the LockBit 2.0 ransomware are skipping the old tried-and-true infiltration vectors like phishing emails, and simply offering cash for disgruntled insiders to provide credentials that will let attackers in through VPN, RDP, or to corporate email addresses.

Join Kilian and Kyle Roth from the Varonis Incident Response team as they break down some of the details on how LockBit works, provide suggestions on how to spot signs of rogue behavior, and ways organizations can reduce the “blast radius” of a compromised account. 

Articles and links referenced in this episode:

LockBit ransomware recruiting insiders to breach corporate networks

👉To learn how we can help, please visit us at: https://www.varonis.com/help/

💻Join us virtually for an upcoming webinar to see a full attack lab: https://www.varonis.com/webinars/threat-detection-response/

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
speed-data: why-cybersecurity-is-an-unceasing-progression-with-siwar-el-assad
Speed Data: Why Cybersecurity is an Unceasing Progression With Siwar El Assad
Siwar El Assad chats about the impact of cybersecurity on modern society, the reality of breaches, and how a chance encounter led Siwar to the industry.
dspm-deep-dive:-debunking-data-security-myths
DSPM Deep Dive: Debunking Data Security Myths
DSPM is the leading acronym in cybersecurity. However, the recent buzz has cluttered the meaning of data security posture management. Let's demystify it.
speed-data:-rethinking-traditional-cybersecurity-principles-with-rick-howard
Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard
Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.
the-benefits-of-threat-and-data-breach-reports
The Benefits of Threat and Data Breach Reports
Threat and data breach reports can help organizations manage security risks and develop mitigation strategies. Learn our three pillars of effective data protection and the benefits from these reports.