Content Retrieve Update Api
GET /api/content/dabcafb6-505b-4797-9af2-b508c12f15f5/
{ "id": 6337, "content_customizations": null, "shortcut_customizations": [ { "id": 5633, "created_at": "2023-04-03T08:33:22.194831Z", "updated_at": "2023-04-03T08:33:22.206781Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/124dd2275a64468b85d73bc2c964d65f/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/original_file.pdf" }, "content": 6337 } ], "content_thumbnail": { "original": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails/1.jpg", "high_quality": { "small": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1.jpg", "medium": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1_medium.jpg", "large": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/preview.jpg" } }, "edited_pages_metadata_count": { "all_pages_count": 38, "edited_pages_count": 0 }, "version": { "id": 6335, "version_number": 2, "version_details": { "uuid": "a196f3f7-1e50-40b9-bae7-d1efb1316426", "created_at": "2022-11-15T09:34:02.151877Z", "updated_at": "2025-03-23T10:59:16.424908Z", "name": "Cyber_Ransomware_RP", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "tags": [] }, "created_at": "2023-04-03T08:33:23.126369Z", "updated_at": "2023-04-03T08:33:23.126445Z", "content_version_name": "Cognyte Ransomware Report", "is_active": true, "type": "DESKTOP", "content": 6337, "version": "a196f3f7-1e50-40b9-bae7-d1efb1316426", "content_uuid": "dabcafb6-505b-4797-9af2-b508c12f15f5", "version_id": "a196f3f7-1e50-40b9-bae7-d1efb1316426" }, "custom_events": [], "content_action": null, "content_stats": { "version": "a196f3f7-1e50-40b9-bae7-d1efb1316426", "visitors_count": 1, "lifetime_visitors_count": 39, "last_seen": "2025-05-07T07:50:37Z", "last_updated": "2025-05-15T12:22:05Z", "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82" }, "content_meta_tags": null, "keywords": [], "seo_content_version_name": "cyber-ransomware-rp", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/bd1fcac0/cyber-ransomware-rp/", "base_url": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI", "fonts": [ "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/AdobeHebrew-Regular_b6.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/Oswald-Bold_e6.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/Oswald-SemiBold_b3.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Bold_b8.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-ExtraBold_d.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Light_ab.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Light_bm.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Medium_bf.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Medium_dz.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Regular_ar.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-Regular_aw.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-SemiBold_bu.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-SemiBold_bu_1.woff", "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/fonts/WorkSans-SemiBold_dy.woff" ], "source_url": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI", "content_type": [], "created_at": "2023-04-03T08:33:21.563143Z", "updated_at": "2025-05-16T00:03:20.344123Z", "original_name": "Cognyte Ransomware Report.pdf", "original_content_type": "application/pdf", "original_file_extension": "pdf", "original_file_size": 3564496.0, "content_key": "users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI", "annotations": { "pages": [ { "page": 32, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1184, 648, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/ransomware-payments-are-going-down-as-more-victims-decide-not-to-pay-up/" } }, { "type": "TextLink", "bounds": [ 83, 1201, 672, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/" } }, { "type": "Link", "bounds": [ 80, 1181, 773, 23 ], "objref": "357", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/ransomware-payments-are-going-down-as-more-victims-decide-not-to-pay-up/ " } }, { "type": "Link", "bounds": [ 80, 1198, 680, 34 ], "objref": "358", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/ " } } ] }, { "page": 34, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1201, 355, 12 ], "action": { "type": "URI", "uri": "https://developer.linkedin.com/docs/reference/industry-codes" } }, { "type": "Link", "bounds": [ 80, 1198, 680, 25 ], "objref": "366", "action": { "type": "URI", "uri": "https://developer.linkedin.com/docs/reference/industry-codes " } } ] }, { "page": 3, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1183, 614, 12 ], "action": { "type": "URI", "uri": "https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf" } }, { "type": "TextLink", "bounds": [ 80, 1199, 465, 12 ], "action": { "type": "URI", "uri": "https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report" } }, { "type": "Link", "bounds": [ 80, 1180, 619, 19 ], "objref": "9", "action": { "type": "URI", "uri": "https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf;" } }, { "type": "Link", "bounds": [ 80, 1198, 466, 17 ], "objref": "10", "action": { "type": "URI", "uri": "https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report" } } ] }, { "page": 38, "annotations": [ { "type": "Link", "bounds": [ 527, 830, 90, 26 ], "objref": "377", "action": { "type": "URI", "uri": "https://www.cognyte.com/cyber-intelligence/cyber-threat-intelligence/" } } ] }, { "page": 6, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1193, 208, 12 ], "action": { "type": "URI", "uri": "https://www.cisa.gov/ransomware" } }, { "type": "Link", "bounds": [ 80, 1190, 209, 19 ], "objref": "56", "action": { "type": "URI", "uri": "https://www.cisa.gov/ransomware" } } ] }, { "page": 8, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1183, 718, 12 ], "action": { "type": "URI", "uri": "https://www.carbonblack.com/blog/vmware-carbon-black-tau-threat-research-visualizing-ransomware-with-mitre/" } }, { "type": "TextLink", "bounds": [ 80, 1199, 714, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/maze-ransomware-is-shutting-down-its-cybercrime-operation/" } }, { "type": "TextLink", "bounds": [ 80, 1164, 243, 12 ], "action": { "type": "URI", "uri": "https://attack.mitre.org/tactics/TA0010/" } }, { "type": "Link", "bounds": [ 80, 1163, 245, 19 ], "objref": "67", "action": { "type": "URI", "uri": "https://attack.mitre.org/tactics/TA0010/" } } ] }, { "page": 9, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1166, 665, 12 ], "action": { "type": "URI", "uri": "https://healthitsecurity.com/news/50-of-ransomware-attacks-lead-to-data-exfiltration-payments-hit-234k" } }, { "type": "TextLink", "bounds": [ 80, 1183, 620, 12 ], "action": { "type": "URI", "uri": "https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-2021-will-be-year-extortion" } }, { "type": "TextLink", "bounds": [ 80, 1199, 477, 12 ], "action": { "type": "URI", "uri": "https://threatpost.com/ransomware-getting-ahead-inevitable-attack/162655/" } }, { "type": "TextLink", "bounds": [ 80, 1148, 465, 12 ], "action": { "type": "URI", "uri": "https://www.coveware.com/blog/q2-2020-ransomware-marketplace-report" } } ] }, { "page": 10, "annotations": [ { "type": "TextLink", "bounds": [ 81, 1199, 659, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gangs-team-up-to-form-extortion-cartel/" } } ] }, { "page": 13, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1170, 272, 12 ], "action": { "type": "URI", "uri": "https://www.ic3.gov/Media/Y2019/PSA191002" } }, { "type": "TextLink", "bounds": [ 80, 1187, 773, 12 ], "action": { "type": "URI", "uri": "https://arstechnica.com/information-technology/2019/10/fbi-warns-of-major-ransomware-attacks-as-criminals-go-big-game-hunting/" } }, { "type": "TextLink", "bounds": [ 80, 1206, 724, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/" } }, { "type": "Link", "bounds": [ 77, 1167, 280, 17 ], "objref": "179", "action": { "type": "URI", "uri": "https://www.ic3.gov/Media/Y2019/PSA191002" } }, { "type": "Link", "bounds": [ 80, 1167, 274, 19 ], "objref": "180", "action": { "type": "URI", "uri": "https://www.ic3.gov/Media/Y2019/PSA191002" } }, { "type": "Link", "bounds": [ 77, 1184, 784, 22 ], "objref": "181", "action": { "type": "URI", "uri": "https://arstechnica.com/information-technology/2019/10/fbi-warns-of-major-ransomware-attacks-as-criminals-go-big-game-hunting/ " } }, { "type": "Link", "bounds": [ 77, 1203, 732, 17 ], "objref": "182", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/ " } } ] }, { "page": 14, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1204, 617, 12 ], "action": { "type": "URI", "uri": "https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269" } }, { "type": "TextLink", "bounds": [ 80, 1186, 642, 12 ], "action": { "type": "URI", "uri": "https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/" } }, { "type": "TextLink", "bounds": [ 80, 1167, 488, 12 ], "action": { "type": "URI", "uri": "https://threatpost.com/netwalker-ransomware-gang-top-notch-affiliates/155946/" } }, { "type": "TextLink", "bounds": [ 80, 1149, 734, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/dozens-of-ransomware-gangs-partner-with-hackers-to-extort-victims/" } }, { "type": "Link", "bounds": [ 78, 1201, 743, 19 ], "objref": "192", "action": { "type": "URI", "uri": "https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269 " } }, { "type": "Link", "bounds": [ 78, 1183, 743, 25 ], "objref": "193", "action": { "type": "URI", "uri": "https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/ " } }, { "type": "Link", "bounds": [ 78, 1164, 494, 19 ], "objref": "194", "action": { "type": "URI", "uri": "https://threatpost.com/netwalker-ransomware-gang-top-notch-affiliates/155946/ " } }, { "type": "Link", "bounds": [ 78, 1146, 743, 19 ], "objref": "195", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/dozens-of-ransomware-gangs-partner-with-hackers-to-extort-victims/ " } } ] }, { "page": 15, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1204, 619, 12 ], "action": { "type": "URI", "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/" } }, { "type": "Link", "bounds": [ 78, 1201, 743, 22 ], "objref": "207", "action": { "type": "URI", "uri": "https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269 " } }, { "type": "Link", "bounds": [ 81, 1201, 624, 19 ], "objref": "208", "action": { "type": "URI", "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/ " } } ] }, { "page": 22, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1170, 533, 12 ], "action": { "type": "URI", "uri": "https://www.infosecurity-magazine.com/news/manufacturing-ransomware-payments/" } }, { "type": "TextLink", "bounds": [ 83, 1187, 718, 12 ], "action": { "type": "URI", "uri": "https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/" } }, { "type": "TextLink", "bounds": [ 83, 1206, 529, 12 ], "action": { "type": "URI", "uri": "https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/" } }, { "type": "Link", "bounds": [ 80, 1167, 587, 23 ], "objref": "251", "action": { "type": "URI", "uri": "https://www.infosecurity-magazine.com/news/manufacturing-ransomware-payments/ " } }, { "type": "Link", "bounds": [ 80, 1184, 784, 19 ], "objref": "252", "action": { "type": "URI", "uri": "https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/ " } }, { "type": "Link", "bounds": [ 80, 1203, 706, 20 ], "objref": "253", "action": { "type": "URI", "uri": "https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/ " } } ] }, { "page": 23, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1155, 643, 12 ], "action": { "type": "URI", "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/" } }, { "type": "TextLink", "bounds": [ 83, 1091, 529, 12 ], "action": { "type": "URI", "uri": "https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/" } }, { "type": "TextLink", "bounds": [ 83, 1105, 734, 12 ], "action": { "type": "URI", "uri": "https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html" } }, { "type": "TextLink", "bounds": [ 83, 1074, 625, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/manufacturing-is-becoming-a-major-target-for-ransomware-attacks/" } }, { "type": "TextLink", "bounds": [ 83, 1174, 352, 12 ], "action": { "type": "URI", "uri": "https://securelist.com/ics-threat-predictions-for-2021/99613/" } }, { "type": "TextLink", "bounds": [ 83, 1120, 634, 12 ], "action": { "type": "URI", "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware" } }, { "type": "TextLink", "bounds": [ 83, 1190, 666, 12 ], "action": { "type": "URI", "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_" } }, { "type": "TextLink", "bounds": [ 83, 1138, 492, 12 ], "action": { "type": "URI", "uri": "https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/" } }, { "type": "Link", "bounds": [ 80, 1152, 653, 20 ], "objref": "260", "action": { "type": "URI", "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/ " } }, { "type": "Link", "bounds": [ 80, 1088, 740, 35 ], "objref": "261", "action": { "type": "URI", "uri": "https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/; https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html " } }, { "type": "Link", "bounds": [ 80, 1071, 636, 20 ], "objref": "262", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/manufacturing-is-becoming-a-major-target-for-ransomware-attacks/ " } }, { "type": "Link", "bounds": [ 80, 1170, 727, 20 ], "objref": "263", "action": { "type": "URI", "uri": "https://securelist.com/ics-threat-predictions-for-2021/99613/ " } }, { "type": "Link", "bounds": [ 80, 1117, 727, 20 ], "objref": "264", "action": { "type": "URI", "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware " } }, { "type": "Link", "bounds": [ 80, 1187, 732, 35 ], "objref": "265", "action": { "type": "URI", "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf " } }, { "type": "Link", "bounds": [ 80, 1135, 539, 19 ], "objref": "266", "action": { "type": "URI", "uri": "https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/ " } } ] }, { "page": 24, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1166, 646, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/" } }, { "type": "TextLink", "bounds": [ 83, 1186, 653, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/" } }, { "type": "TextLink", "bounds": [ 83, 1132, 570, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/kaspersky-north-korean-hackers-are-behind-the-vhd-ransomware/" } }, { "type": "TextLink", "bounds": [ 83, 1201, 445, 12 ], "action": { "type": "URI", "uri": "https://www.clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdf" } }, { "type": "TextLink", "bounds": [ 83, 1149, 613, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/" } }, { "type": "Link", "bounds": [ 80, 1164, 653, 19 ], "objref": "277", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/ " } }, { "type": "Link", "bounds": [ 80, 1181, 727, 23 ], "objref": "278", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/ " } }, { "type": "Link", "bounds": [ 80, 1129, 727, 19 ], "objref": "279", "action": { "type": "URI", "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware " } }, { "type": "Link", "bounds": [ 83, 1129, 572, 19 ], "objref": "280", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/kaspersky-north-korean-hackers-are-behind-the-vhd-ransomware/" } }, { "type": "Link", "bounds": [ 80, 1198, 454, 28 ], "objref": "281", "action": { "type": "URI", "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf " } }, { "type": "Link", "bounds": [ 80, 1146, 624, 19 ], "objref": "282", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/ " } } ] }, { "page": 25, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1151, 559, 12 ], "action": { "type": "URI", "uri": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/?kA23Z000000KBro" } }, { "type": "TextLink", "bounds": [ 83, 1167, 587, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/" } }, { "type": "TextLink", "bounds": [ 675, 1167, 167, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer" } }, { "type": "TextLink", "bounds": [ 599, 1184, 245, 11 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/" } }, { "type": "TextLink", "bounds": [ 83, 1070, 501, 12 ], "action": { "type": "URI", "uri": "https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/" } }, { "type": "TextLink", "bounds": [ 83, 1088, 712, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/" } }, { "type": "TextLink", "bounds": [ 83, 1103, 674, 12 ], "action": { "type": "URI", "uri": "http://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/" } }, { "type": "TextLink", "bounds": [ 478, 1119, 364, 12 ], "action": { "type": "URI", "uri": "https://www.bankinfosecurity.com/nephilim-ransomware-gang-" } }, { "type": "TextLink", "bounds": [ 306, 1134, 538, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp/" } }, { "type": "Link", "bounds": [ 80, 1148, 653, 23 ], "objref": "292", "action": { "type": "URI", "uri": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/?kA23Z000000KBro " } }, { "type": "Link", "bounds": [ 80, 1164, 769, 55 ], "objref": "293", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/; https://www.bleepingcomputer.com/news/security/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws/; https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/ " } }, { "type": "Link", "bounds": [ 80, 1067, 727, 25 ], "objref": "294", "action": { "type": "URI", "uri": "https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/ " } }, { "type": "Link", "bounds": [ 80, 1085, 769, 63 ], "objref": "295", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/; https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/; https://www.infosecurity-magazine.com/news/it-services-firm-conduent-felled/; https://www.bankinfosecurity.com/nephilim-ransomware-gang-tied-to-citrix-gateway-hacks-a-14480; https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp/ " } } ] }, { "page": 26, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1154, 585, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/" } }, { "type": "TextLink", "bounds": [ 83, 1137, 436, 12 ], "action": { "type": "URI", "uri": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472" } }, { "type": "TextLink", "bounds": [ 83, 1172, 475, 12 ], "action": { "type": "URI", "uri": "https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/" } }, { "type": "TextLink", "bounds": [ 83, 1190, 717, 12 ], "action": { "type": "URI", "uri": "https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF" } }, { "type": "TextLink", "bounds": [ 83, 1206, 532, 12 ], "action": { "type": "URI", "uri": "http://www.bankinfosecurity.com/iranian-hackers-exploiting-unpatched-vulnerabilities-a-15001" } }, { "type": "Link", "bounds": [ 80, 1151, 596, 23 ], "objref": "303", "action": { "type": "URI", "uri": "https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/" } }, { "type": "Link", "bounds": [ 80, 1134, 636, 23 ], "objref": "304", "action": { "type": "URI", "uri": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472 " } }, { "type": "Link", "bounds": [ 80, 1169, 727, 23 ], "objref": "305", "action": { "type": "URI", "uri": "https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/ " } }, { "type": "Link", "bounds": [ 80, 1187, 778, 40 ], "objref": "306", "action": { "type": "URI", "uri": "https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF; https://www.bankinfosecurity.com/iranian-hackers-exploiting-unpatched-vulnerabilities-a-15001 " } } ] }, { "page": 27, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1097, 761, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/" } }, { "type": "TextLink", "bounds": [ 83, 1115, 669, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/" } }, { "type": "TextLink", "bounds": [ 83, 1132, 672, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/" } }, { "type": "TextLink", "bounds": [ 83, 1151, 672, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/" } }, { "type": "TextLink", "bounds": [ 83, 1184, 761, 12 ], "action": { "type": "URI", "uri": "https://mybroadband.co.za/news/security/374310-ransomware-group-releases-data-after-attack-on-office-of-the-chief-justice.html" } }, { "type": "TextLink", "bounds": [ 83, 1167, 613, 12 ], "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/111654/cyber-crime/delaware-county-doppelpaymer-ransomware.html" } }, { "type": "TextLink", "bounds": [ 83, 1201, 672, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/" } }, { "type": "TextLink", "bounds": [ 83, 1045, 446, 12 ], "action": { "type": "URI", "uri": "https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/" } }, { "type": "TextLink", "bounds": [ 83, 1064, 617, 12 ], "action": { "type": "URI", "uri": "https://www.trendmicro.com/en_us/research/21/a/an-overview-of-the-doppelpaymer-ransomware.html" } }, { "type": "TextLink", "bounds": [ 83, 1079, 701, 12 ], "action": { "type": "URI", "uri": "https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/" } }, { "type": "Link", "bounds": [ 80, 1094, 773, 22 ], "objref": "314", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/" } }, { "type": "Link", "bounds": [ 80, 1112, 680, 20 ], "objref": "315", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/" } }, { "type": "Link", "bounds": [ 80, 1129, 680, 20 ], "objref": "316", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/" } }, { "type": "Link", "bounds": [ 80, 1148, 680, 19 ], "objref": "317", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/" } }, { "type": "Link", "bounds": [ 80, 1181, 773, 23 ], "objref": "318", "action": { "type": "URI", "uri": "https://mybroadband.co.za/news/security/374310-ransomware-group-releases-data-after-attack-on-office-of-the-chief-justice.html" } }, { "type": "Link", "bounds": [ 80, 1164, 680, 23 ], "objref": "319", "action": { "type": "URI", "uri": "https://securityaffairs.co/wordpress/111654/cyber-crime/delaware-county-doppelpaymer-ransomware.html" } }, { "type": "Link", "bounds": [ 80, 1198, 680, 22 ], "objref": "320", "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/" } }, { "type": "Link", "bounds": [ 80, 1044, 727, 19 ], "objref": "321", "action": { "type": "URI", "uri": "https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/ " } }, { "type": "Link", "bounds": [ 80, 1060, 769, 38 ], "objref": "322", "action": { "type": "URI", "uri": "https://www.trendmicro.com/en_us/research/21/a/an-overview-of-the-doppelpaymer-ransomware.html; https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/ " } } ] }, { "page": 28, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1175, 610, 12 ], "action": { "type": "URI", "uri": "https://www.securityweek.com/fbi-warns-doppelpaymer-ransomware-targeting-critical-infrastructure" } }, { "type": "TextLink", "bounds": [ 83, 1190, 307, 12 ], "action": { "type": "URI", "uri": "https://www.ic3.gov/Media/News/2020/201215-1.pdf" } }, { "type": "TextLink", "bounds": [ 83, 1207, 697, 12 ], "action": { "type": "URI", "uri": "https://blog.sensecy.com/2020/03/22/hackers-continue-to-exploit-the-covid-19-pandemic-in-malicious-campaigns/" } }, { "type": "Link", "bounds": [ 80, 1172, 772, 46 ], "objref": "335", "action": { "type": "URI", "uri": "https://www.securityweek.com/fbi-warns-doppelpaymer-ransomware-targeting-critical-infrastructure; https://www.ic3.gov/Media/News/2020/201215-1.pdf " } }, { "type": "Link", "bounds": [ 80, 1204, 708, 22 ], "objref": "336", "action": { "type": "URI", "uri": "https://blog.sensecy.com/2020/03/22/hackers-continue-to-exploit-the-covid-19-pandemic-in-malicious-campaigns/ " } } ] }, { "page": 29, "annotations": [ { "type": "TextLink", "bounds": [ 83, 1206, 428, 12 ], "action": { "type": "URI", "uri": "https://www.cognyte.com/how-to-avoid-2020-online-shopping-threats/" } }, { "type": "TextLink", "bounds": [ 83, 1189, 495, 12 ], "action": { "type": "URI", "uri": "https://www.washingtonpost.com/graphics/2020/world/coronavirus-2020-timeline/" } }, { "type": "TextLink", "bounds": [ 83, 1172, 199, 12 ], "action": { "type": "URI", "uri": "https://time.graphics/line/386203" } }, { "type": "Link", "bounds": [ 80, 1203, 436, 17 ], "objref": "342", "action": { "type": "URI", "uri": "https://blog.sensecy.com/2020/11/19/how-to-avoid-2020-online-shopping-threats/; https://www.cognyte.com/how-to-avoid-2020-online-shopping-threats/ " } }, { "type": "Link", "bounds": [ 80, 1186, 708, 25 ], "objref": "343", "action": { "type": "URI", "uri": "https://www.washingtonpost.com/graphics/2020/world/coronavirus-2020-timeline/" } }, { "type": "Link", "bounds": [ 80, 1169, 208, 23 ], "objref": "344", "action": { "type": "URI", "uri": "https://time.graphics/line/386203" } } ] } ] }, "config": { "pagecount": 38, "title": "", "author": "", "subject": "", "keywords": "", "creator": "Adobe InDesign 17.0 (Windows)", "producer": "Adobe PDF Library 16.0.3", "creationdate": "D:20220510155904+03'00'", "moddate": "D:20220510155942+03'00'", "trapped": "False", "fileName": "_OfdiOVI.pdf", "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ], "bookmarks": [], "thumbnailType": "jpg", "pageType": "html", "pageLabels": [] }, "uuid": "dabcafb6-505b-4797-9af2-b508c12f15f5", "is_public": true, "description": "GLOBAL THREAT INTELLIGENCE REPORT The Ransomware Landscape March 2021 ", "views_count": 376, "is_high_quality_thumbnails_available": true, "is_archived": false, "conversion_type": "DOCUMENT", "user": 272 }