{"content_customizations":null,"shortcut_customizations":[{"id":5633,"created_at":"2023-04-03T08:33:22.194831Z","updated_at":"2023-04-03T08:33:22.206781Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/124dd2275a64468b85d73bc2c964d65f/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/original_file.pdf"},"content":6337}],"content_thumbnail":{"original":"/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails/1.jpg","high_quality":{"small":"/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1.jpg","medium":"/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1_medium.jpg","large":"/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":2,"version_details":{"uuid":"a196f3f7-1e50-40b9-bae7-d1efb1316426","name":"Cyber_Ransomware_RP","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":null,"tags":[]},"is_active":true,"type":"DESKTOP","version":"a196f3f7-1e50-40b9-bae7-d1efb1316426","content_uuid":"dabcafb6-505b-4797-9af2-b508c12f15f5","version_id":"a196f3f7-1e50-40b9-bae7-d1efb1316426"},"custom_events":[],"content_action":null,"content_stats":{"version":"a196f3f7-1e50-40b9-bae7-d1efb1316426","visitors_count":3,"lifetime_visitors_count":null,"last_seen":"2026-03-11T00:00:00Z","last_updated":"2026-04-17T04:25:41Z","account":"bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"},"content_meta_tags":null,"keywords":[],"seo_content_version_name":"cyber-ransomware-rp","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/bd1fcac0/cyber-ransomware-rp/","base_url":"/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI","config":{"pagecount":38,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":32,"annotations":[{"type":"TextLink","bounds":[83,1184,648,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/ransomware-payments-are-going-down-as-more-victims-decide-not-to-pay-up/"}},{"type":"TextLink","bounds":[83,1201,672,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/"}},{"type":"Link","bounds":[80,1181,773,23],"objref":"357","action":{"type":"URI","uri":"https://www.zdnet.com/article/ransomware-payments-are-going-down-as-more-victims-decide-not-to-pay-up/ "}},{"type":"Link","bounds":[80,1198,680,34],"objref":"358","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/ "}}]},{"page":34,"annotations":[{"type":"TextLink","bounds":[83,1201,355,12],"action":{"type":"URI","uri":"https://developer.linkedin.com/docs/reference/industry-codes"}},{"type":"Link","bounds":[80,1198,680,25],"objref":"366","action":{"type":"URI","uri":"https://developer.linkedin.com/docs/reference/industry-codes "}}]},{"page":3,"annotations":[{"type":"TextLink","bounds":[80,1183,614,12],"action":{"type":"URI","uri":"https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf"}},{"type":"TextLink","bounds":[80,1199,465,12],"action":{"type":"URI","uri":"https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report"}},{"type":"Link","bounds":[80,1180,619,19],"objref":"9","action":{"type":"URI","uri":"https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf;"}},{"type":"Link","bounds":[80,1198,466,17],"objref":"10","action":{"type":"URI","uri":"https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report"}}]},{"page":38,"annotations":[{"type":"Link","bounds":[527,830,90,26],"objref":"377","action":{"type":"URI","uri":"https://www.cognyte.com/cyber-intelligence/cyber-threat-intelligence/"}}]},{"page":6,"annotations":[{"type":"TextLink","bounds":[80,1193,208,12],"action":{"type":"URI","uri":"https://www.cisa.gov/ransomware"}},{"type":"Link","bounds":[80,1190,209,19],"objref":"56","action":{"type":"URI","uri":"https://www.cisa.gov/ransomware"}}]},{"page":8,"annotations":[{"type":"TextLink","bounds":[80,1183,718,12],"action":{"type":"URI","uri":"https://www.carbonblack.com/blog/vmware-carbon-black-tau-threat-research-visualizing-ransomware-with-mitre/"}},{"type":"TextLink","bounds":[80,1199,714,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/maze-ransomware-is-shutting-down-its-cybercrime-operation/"}},{"type":"TextLink","bounds":[80,1164,243,12],"action":{"type":"URI","uri":"https://attack.mitre.org/tactics/TA0010/"}},{"type":"Link","bounds":[80,1163,245,19],"objref":"67","action":{"type":"URI","uri":"https://attack.mitre.org/tactics/TA0010/"}}]},{"page":9,"annotations":[{"type":"TextLink","bounds":[80,1166,665,12],"action":{"type":"URI","uri":"https://healthitsecurity.com/news/50-of-ransomware-attacks-lead-to-data-exfiltration-payments-hit-234k"}},{"type":"TextLink","bounds":[80,1183,620,12],"action":{"type":"URI","uri":"https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-2021-will-be-year-extortion"}},{"type":"TextLink","bounds":[80,1199,477,12],"action":{"type":"URI","uri":"https://threatpost.com/ransomware-getting-ahead-inevitable-attack/162655/"}},{"type":"TextLink","bounds":[80,1148,465,12],"action":{"type":"URI","uri":"https://www.coveware.com/blog/q2-2020-ransomware-marketplace-report"}}]},{"page":10,"annotations":[{"type":"TextLink","bounds":[81,1199,659,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ransomware-gangs-team-up-to-form-extortion-cartel/"}}]},{"page":13,"annotations":[{"type":"TextLink","bounds":[80,1170,272,12],"action":{"type":"URI","uri":"https://www.ic3.gov/Media/Y2019/PSA191002"}},{"type":"TextLink","bounds":[80,1187,773,12],"action":{"type":"URI","uri":"https://arstechnica.com/information-technology/2019/10/fbi-warns-of-major-ransomware-attacks-as-criminals-go-big-game-hunting/"}},{"type":"TextLink","bounds":[80,1206,724,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/"}},{"type":"Link","bounds":[77,1167,280,17],"objref":"179","action":{"type":"URI","uri":"https://www.ic3.gov/Media/Y2019/PSA191002"}},{"type":"Link","bounds":[80,1167,274,19],"objref":"180","action":{"type":"URI","uri":"https://www.ic3.gov/Media/Y2019/PSA191002"}},{"type":"Link","bounds":[77,1184,784,22],"objref":"181","action":{"type":"URI","uri":"https://arstechnica.com/information-technology/2019/10/fbi-warns-of-major-ransomware-attacks-as-criminals-go-big-game-hunting/ "}},{"type":"Link","bounds":[77,1203,732,17],"objref":"182","action":{"type":"URI","uri":"https://www.zdnet.com/article/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/ "}}]},{"page":14,"annotations":[{"type":"TextLink","bounds":[80,1204,617,12],"action":{"type":"URI","uri":"https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269"}},{"type":"TextLink","bounds":[80,1186,642,12],"action":{"type":"URI","uri":"https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/"}},{"type":"TextLink","bounds":[80,1167,488,12],"action":{"type":"URI","uri":"https://threatpost.com/netwalker-ransomware-gang-top-notch-affiliates/155946/"}},{"type":"TextLink","bounds":[80,1149,734,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/dozens-of-ransomware-gangs-partner-with-hackers-to-extort-victims/"}},{"type":"Link","bounds":[78,1201,743,19],"objref":"192","action":{"type":"URI","uri":"https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269 "}},{"type":"Link","bounds":[78,1183,743,25],"objref":"193","action":{"type":"URI","uri":"https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/ "}},{"type":"Link","bounds":[78,1164,494,19],"objref":"194","action":{"type":"URI","uri":"https://threatpost.com/netwalker-ransomware-gang-top-notch-affiliates/155946/ "}},{"type":"Link","bounds":[78,1146,743,19],"objref":"195","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/dozens-of-ransomware-gangs-partner-with-hackers-to-extort-victims/ "}}]},{"page":15,"annotations":[{"type":"TextLink","bounds":[80,1204,619,12],"action":{"type":"URI","uri":"https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/"}},{"type":"Link","bounds":[78,1201,743,22],"objref":"207","action":{"type":"URI","uri":"https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269 "}},{"type":"Link","bounds":[81,1201,624,19],"objref":"208","action":{"type":"URI","uri":"https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/ "}}]},{"page":22,"annotations":[{"type":"TextLink","bounds":[83,1170,533,12],"action":{"type":"URI","uri":"https://www.infosecurity-magazine.com/news/manufacturing-ransomware-payments/"}},{"type":"TextLink","bounds":[83,1187,718,12],"action":{"type":"URI","uri":"https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/"}},{"type":"TextLink","bounds":[83,1206,529,12],"action":{"type":"URI","uri":"https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/"}},{"type":"Link","bounds":[80,1167,587,23],"objref":"251","action":{"type":"URI","uri":"https://www.infosecurity-magazine.com/news/manufacturing-ransomware-payments/ "}},{"type":"Link","bounds":[80,1184,784,19],"objref":"252","action":{"type":"URI","uri":"https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/ "}},{"type":"Link","bounds":[80,1203,706,20],"objref":"253","action":{"type":"URI","uri":"https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/ "}}]},{"page":23,"annotations":[{"type":"TextLink","bounds":[83,1155,643,12],"action":{"type":"URI","uri":"https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/"}},{"type":"TextLink","bounds":[83,1091,529,12],"action":{"type":"URI","uri":"https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/"}},{"type":"TextLink","bounds":[83,1105,734,12],"action":{"type":"URI","uri":"https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html"}},{"type":"TextLink","bounds":[83,1074,625,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/manufacturing-is-becoming-a-major-target-for-ransomware-attacks/"}},{"type":"TextLink","bounds":[83,1174,352,12],"action":{"type":"URI","uri":"https://securelist.com/ics-threat-predictions-for-2021/99613/"}},{"type":"TextLink","bounds":[83,1120,634,12],"action":{"type":"URI","uri":"https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware"}},{"type":"TextLink","bounds":[83,1190,666,12],"action":{"type":"URI","uri":"https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_"}},{"type":"TextLink","bounds":[83,1138,492,12],"action":{"type":"URI","uri":"https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/"}},{"type":"Link","bounds":[80,1152,653,20],"objref":"260","action":{"type":"URI","uri":"https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/ "}},{"type":"Link","bounds":[80,1088,740,35],"objref":"261","action":{"type":"URI","uri":"https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/; https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html   "}},{"type":"Link","bounds":[80,1071,636,20],"objref":"262","action":{"type":"URI","uri":"https://www.zdnet.com/article/manufacturing-is-becoming-a-major-target-for-ransomware-attacks/ "}},{"type":"Link","bounds":[80,1170,727,20],"objref":"263","action":{"type":"URI","uri":"https://securelist.com/ics-threat-predictions-for-2021/99613/ "}},{"type":"Link","bounds":[80,1117,727,20],"objref":"264","action":{"type":"URI","uri":"https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware "}},{"type":"Link","bounds":[80,1187,732,35],"objref":"265","action":{"type":"URI","uri":"https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf "}},{"type":"Link","bounds":[80,1135,539,19],"objref":"266","action":{"type":"URI","uri":"https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/ "}}]},{"page":24,"annotations":[{"type":"TextLink","bounds":[83,1166,646,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/"}},{"type":"TextLink","bounds":[83,1186,653,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/"}},{"type":"TextLink","bounds":[83,1132,570,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/kaspersky-north-korean-hackers-are-behind-the-vhd-ransomware/"}},{"type":"TextLink","bounds":[83,1201,445,12],"action":{"type":"URI","uri":"https://www.clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdf"}},{"type":"TextLink","bounds":[83,1149,613,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/"}},{"type":"Link","bounds":[80,1164,653,19],"objref":"277","action":{"type":"URI","uri":"https://www.zdnet.com/article/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/ "}},{"type":"Link","bounds":[80,1181,727,23],"objref":"278","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/ "}},{"type":"Link","bounds":[80,1129,727,19],"objref":"279","action":{"type":"URI","uri":"https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware "}},{"type":"Link","bounds":[83,1129,572,19],"objref":"280","action":{"type":"URI","uri":"https://www.zdnet.com/article/kaspersky-north-korean-hackers-are-behind-the-vhd-ransomware/"}},{"type":"Link","bounds":[80,1198,454,28],"objref":"281","action":{"type":"URI","uri":"https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf "}},{"type":"Link","bounds":[80,1146,624,19],"objref":"282","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/ "}}]},{"page":25,"annotations":[{"type":"TextLink","bounds":[83,1151,559,12],"action":{"type":"URI","uri":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/?kA23Z000000KBro"}},{"type":"TextLink","bounds":[83,1167,587,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/"}},{"type":"TextLink","bounds":[675,1167,167,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer"}},{"type":"TextLink","bounds":[599,1184,245,11],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/"}},{"type":"TextLink","bounds":[83,1070,501,12],"action":{"type":"URI","uri":"https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/"}},{"type":"TextLink","bounds":[83,1088,712,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/"}},{"type":"TextLink","bounds":[83,1103,674,12],"action":{"type":"URI","uri":"http://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"}},{"type":"TextLink","bounds":[478,1119,364,12],"action":{"type":"URI","uri":"https://www.bankinfosecurity.com/nephilim-ransomware-gang-"}},{"type":"TextLink","bounds":[306,1134,538,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp/"}},{"type":"Link","bounds":[80,1148,653,23],"objref":"292","action":{"type":"URI","uri":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/?kA23Z000000KBro "}},{"type":"Link","bounds":[80,1164,769,55],"objref":"293","action":{"type":"URI","uri":"https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/; https://www.bleepingcomputer.com/news/security/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws/; https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/ "}},{"type":"Link","bounds":[80,1067,727,25],"objref":"294","action":{"type":"URI","uri":"https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/ "}},{"type":"Link","bounds":[80,1085,769,63],"objref":"295","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/; https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/; https://www.infosecurity-magazine.com/news/it-services-firm-conduent-felled/; https://www.bankinfosecurity.com/nephilim-ransomware-gang-tied-to-citrix-gateway-hacks-a-14480; https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp/  "}}]},{"page":26,"annotations":[{"type":"TextLink","bounds":[83,1154,585,12],"action":{"type":"URI","uri":"https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/"}},{"type":"TextLink","bounds":[83,1137,436,12],"action":{"type":"URI","uri":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472"}},{"type":"TextLink","bounds":[83,1172,475,12],"action":{"type":"URI","uri":"https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/"}},{"type":"TextLink","bounds":[83,1190,717,12],"action":{"type":"URI","uri":"https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF"}},{"type":"TextLink","bounds":[83,1206,532,12],"action":{"type":"URI","uri":"http://www.bankinfosecurity.com/iranian-hackers-exploiting-unpatched-vulnerabilities-a-15001"}},{"type":"Link","bounds":[80,1151,596,23],"objref":"303","action":{"type":"URI","uri":"https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/"}},{"type":"Link","bounds":[80,1134,636,23],"objref":"304","action":{"type":"URI","uri":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472 "}},{"type":"Link","bounds":[80,1169,727,23],"objref":"305","action":{"type":"URI","uri":"https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/ "}},{"type":"Link","bounds":[80,1187,778,40],"objref":"306","action":{"type":"URI","uri":"https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF; https://www.bankinfosecurity.com/iranian-hackers-exploiting-unpatched-vulnerabilities-a-15001 "}}]},{"page":27,"annotations":[{"type":"TextLink","bounds":[83,1097,761,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"}},{"type":"TextLink","bounds":[83,1115,669,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"}},{"type":"TextLink","bounds":[83,1132,672,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"}},{"type":"TextLink","bounds":[83,1151,672,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/"}},{"type":"TextLink","bounds":[83,1184,761,12],"action":{"type":"URI","uri":"https://mybroadband.co.za/news/security/374310-ransomware-group-releases-data-after-attack-on-office-of-the-chief-justice.html"}},{"type":"TextLink","bounds":[83,1167,613,12],"action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/111654/cyber-crime/delaware-county-doppelpaymer-ransomware.html"}},{"type":"TextLink","bounds":[83,1201,672,12],"action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"}},{"type":"TextLink","bounds":[83,1045,446,12],"action":{"type":"URI","uri":"https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/"}},{"type":"TextLink","bounds":[83,1064,617,12],"action":{"type":"URI","uri":"https://www.trendmicro.com/en_us/research/21/a/an-overview-of-the-doppelpaymer-ransomware.html"}},{"type":"TextLink","bounds":[83,1079,701,12],"action":{"type":"URI","uri":"https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/"}},{"type":"Link","bounds":[80,1094,773,22],"objref":"314","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"}},{"type":"Link","bounds":[80,1112,680,20],"objref":"315","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"}},{"type":"Link","bounds":[80,1129,680,20],"objref":"316","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"}},{"type":"Link","bounds":[80,1148,680,19],"objref":"317","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/"}},{"type":"Link","bounds":[80,1181,773,23],"objref":"318","action":{"type":"URI","uri":"https://mybroadband.co.za/news/security/374310-ransomware-group-releases-data-after-attack-on-office-of-the-chief-justice.html"}},{"type":"Link","bounds":[80,1164,680,23],"objref":"319","action":{"type":"URI","uri":"https://securityaffairs.co/wordpress/111654/cyber-crime/delaware-county-doppelpaymer-ransomware.html"}},{"type":"Link","bounds":[80,1198,680,22],"objref":"320","action":{"type":"URI","uri":"https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"}},{"type":"Link","bounds":[80,1044,727,19],"objref":"321","action":{"type":"URI","uri":"https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/ "}},{"type":"Link","bounds":[80,1060,769,38],"objref":"322","action":{"type":"URI","uri":"https://www.trendmicro.com/en_us/research/21/a/an-overview-of-the-doppelpaymer-ransomware.html; https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/ "}}]},{"page":28,"annotations":[{"type":"TextLink","bounds":[83,1175,610,12],"action":{"type":"URI","uri":"https://www.securityweek.com/fbi-warns-doppelpaymer-ransomware-targeting-critical-infrastructure"}},{"type":"TextLink","bounds":[83,1190,307,12],"action":{"type":"URI","uri":"https://www.ic3.gov/Media/News/2020/201215-1.pdf"}},{"type":"TextLink","bounds":[83,1207,697,12],"action":{"type":"URI","uri":"https://blog.sensecy.com/2020/03/22/hackers-continue-to-exploit-the-covid-19-pandemic-in-malicious-campaigns/"}},{"type":"Link","bounds":[80,1172,772,46],"objref":"335","action":{"type":"URI","uri":"https://www.securityweek.com/fbi-warns-doppelpaymer-ransomware-targeting-critical-infrastructure; https://www.ic3.gov/Media/News/2020/201215-1.pdf "}},{"type":"Link","bounds":[80,1204,708,22],"objref":"336","action":{"type":"URI","uri":"https://blog.sensecy.com/2020/03/22/hackers-continue-to-exploit-the-covid-19-pandemic-in-malicious-campaigns/ "}}]},{"page":29,"annotations":[{"type":"TextLink","bounds":[83,1206,428,12],"action":{"type":"URI","uri":"https://www.cognyte.com/how-to-avoid-2020-online-shopping-threats/"}},{"type":"TextLink","bounds":[83,1189,495,12],"action":{"type":"URI","uri":"https://www.washingtonpost.com/graphics/2020/world/coronavirus-2020-timeline/"}},{"type":"TextLink","bounds":[83,1172,199,12],"action":{"type":"URI","uri":"https://time.graphics/line/386203"}},{"type":"Link","bounds":[80,1203,436,17],"objref":"342","action":{"type":"URI","uri":"https://blog.sensecy.com/2020/11/19/how-to-avoid-2020-online-shopping-threats/; https://www.cognyte.com/how-to-avoid-2020-online-shopping-threats/   "}},{"type":"Link","bounds":[80,1186,708,25],"objref":"343","action":{"type":"URI","uri":"https://www.washingtonpost.com/graphics/2020/world/coronavirus-2020-timeline/"}},{"type":"Link","bounds":[80,1169,208,23],"objref":"344","action":{"type":"URI","uri":"https://time.graphics/line/386203"}}]}]},"created_at":"2023-04-03T08:33:21.563143Z","updated_at":"2026-04-17T04:58:53.830545Z","original_name":"Cognyte Ransomware Report.pdf","uuid":"dabcafb6-505b-4797-9af2-b508c12f15f5","description":"GLOBAL THREAT INTELLIGENCE REPORT The Ransomware Landscape March 2021 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}