GET /api/content/dabcafb6-505b-4797-9af2-b508c12f15f5/?format=api
HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "content_customizations": null,
    "shortcut_customizations": [
        {
            "id": 5633,
            "created_at": "2023-04-03T08:33:22.194831Z",
            "updated_at": "2023-04-03T08:33:22.206781Z",
            "action": "DOWNLOAD",
            "color": "#FFFFFF",
            "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/272/shortcut_customizations/124dd2275a64468b85d73bc2c964d65f/download_icon.svg",
            "additional_data": {
                "download_url": "https://media.celero.io/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/original_file.pdf"
            },
            "content": 6337
        }
    ],
    "content_thumbnail": {
        "original": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails/1.jpg",
        "high_quality": {
            "small": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1.jpg",
            "medium": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1_medium.jpg",
            "large": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/1_large.jpg",
            "microsite_preview": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI/thumbnails_high_quality/preview.jpg"
        }
    },
    "version": {
        "version_number": 2,
        "version_details": {
            "uuid": "a196f3f7-1e50-40b9-bae7-d1efb1316426",
            "name": "Cyber_Ransomware_RP",
            "is_live": true,
            "access_control": {
                "min_stage": "EVERYONE_ALLOWED",
                "stage_options": {
                    "UNVERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE",
                        "form_id": "default"
                    },
                    "VERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE"
                    },
                    "GDPR_CONSENT": {},
                    "PRIVATE": {},
                    "EVERYONE_ALLOWED": {}
                }
            },
            "base_shorten": null,
            "tags": []
        },
        "is_active": true,
        "type": "DESKTOP",
        "version": "a196f3f7-1e50-40b9-bae7-d1efb1316426",
        "content_uuid": "dabcafb6-505b-4797-9af2-b508c12f15f5",
        "version_id": "a196f3f7-1e50-40b9-bae7-d1efb1316426"
    },
    "custom_events": [],
    "content_action": null,
    "content_stats": {
        "version": "a196f3f7-1e50-40b9-bae7-d1efb1316426",
        "visitors_count": 25,
        "lifetime_visitors_count": null,
        "last_seen": "2026-02-03T00:00:00Z",
        "last_updated": "2026-02-22T10:15:45Z",
        "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
    },
    "content_meta_tags": null,
    "keywords": [],
    "seo_content_version_name": "cyber-ransomware-rp",
    "html_snippets": null,
    "is_live": true,
    "shorten": "https://engage.cognyte.com/s/bd1fcac0/cyber-ransomware-rp/",
    "base_url": "/users/272/content/3c30525183b146a18f16a50e4dda6ab0/_OfdiOVI",
    "config": {
        "pagecount": 38,
        "bounds": [
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ]
        ]
    },
    "annotations": {
        "pages": [
            {
                "page": 32,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1184,
                            648,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/ransomware-payments-are-going-down-as-more-victims-decide-not-to-pay-up/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1181,
                            773,
                            23
                        ],
                        "objref": "357",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/ransomware-payments-are-going-down-as-more-victims-decide-not-to-pay-up/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1198,
                            680,
                            34
                        ],
                        "objref": "358",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/another-ransomware-now-uses-ddos-attacks-to-force-victims-to-pay/ "
                        }
                    }
                ]
            },
            {
                "page": 34,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            355,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://developer.linkedin.com/docs/reference/industry-codes"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1198,
                            680,
                            25
                        ],
                        "objref": "366",
                        "action": {
                            "type": "URI",
                            "uri": "https://developer.linkedin.com/docs/reference/industry-codes "
                        }
                    }
                ]
            },
            {
                "page": 3,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1183,
                            614,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1199,
                            465,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1180,
                            619,
                            19
                        ],
                        "objref": "9",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophos-2021-threat-report.pdf;"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1198,
                            466,
                            17
                        ],
                        "objref": "10",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report"
                        }
                    }
                ]
            },
            {
                "page": 38,
                "annotations": [
                    {
                        "type": "Link",
                        "bounds": [
                            527,
                            830,
                            90,
                            26
                        ],
                        "objref": "377",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/cyber-intelligence/cyber-threat-intelligence/"
                        }
                    }
                ]
            },
            {
                "page": 6,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1193,
                            208,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cisa.gov/ransomware"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1190,
                            209,
                            19
                        ],
                        "objref": "56",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cisa.gov/ransomware"
                        }
                    }
                ]
            },
            {
                "page": 8,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1183,
                            718,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.carbonblack.com/blog/vmware-carbon-black-tau-threat-research-visualizing-ransomware-with-mitre/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1199,
                            714,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/maze-ransomware-is-shutting-down-its-cybercrime-operation/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1164,
                            243,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://attack.mitre.org/tactics/TA0010/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1163,
                            245,
                            19
                        ],
                        "objref": "67",
                        "action": {
                            "type": "URI",
                            "uri": "https://attack.mitre.org/tactics/TA0010/"
                        }
                    }
                ]
            },
            {
                "page": 9,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1166,
                            665,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://healthitsecurity.com/news/50-of-ransomware-attacks-lead-to-data-exfiltration-payments-hit-234k"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1183,
                            620,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-2021-will-be-year-extortion"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1199,
                            477,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/ransomware-getting-ahead-inevitable-attack/162655/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1148,
                            465,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.coveware.com/blog/q2-2020-ransomware-marketplace-report"
                        }
                    }
                ]
            },
            {
                "page": 10,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            81,
                            1199,
                            659,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/ransomware-gangs-team-up-to-form-extortion-cartel/"
                        }
                    }
                ]
            },
            {
                "page": 13,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1170,
                            272,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.ic3.gov/Media/Y2019/PSA191002"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1187,
                            773,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://arstechnica.com/information-technology/2019/10/fbi-warns-of-major-ransomware-attacks-as-criminals-go-big-game-hunting/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1206,
                            724,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            77,
                            1167,
                            280,
                            17
                        ],
                        "objref": "179",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.ic3.gov/Media/Y2019/PSA191002"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1167,
                            274,
                            19
                        ],
                        "objref": "180",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.ic3.gov/Media/Y2019/PSA191002"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            77,
                            1184,
                            784,
                            22
                        ],
                        "objref": "181",
                        "action": {
                            "type": "URI",
                            "uri": "https://arstechnica.com/information-technology/2019/10/fbi-warns-of-major-ransomware-attacks-as-criminals-go-big-game-hunting/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            77,
                            1203,
                            732,
                            17
                        ],
                        "objref": "182",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/ "
                        }
                    }
                ]
            },
            {
                "page": 14,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1204,
                            617,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1186,
                            642,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1167,
                            488,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/netwalker-ransomware-gang-top-notch-affiliates/155946/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1149,
                            734,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/dozens-of-ransomware-gangs-partner-with-hackers-to-extort-victims/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            78,
                            1201,
                            743,
                            19
                        ],
                        "objref": "192",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269 "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            78,
                            1183,
                            743,
                            25
                        ],
                        "objref": "193",
                        "action": {
                            "type": "URI",
                            "uri": "https://intel471.com/blog/revil-ransomware-as-a-service-an-analysis-of-a-ransomware-affiliate-operation/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            78,
                            1164,
                            494,
                            19
                        ],
                        "objref": "194",
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/netwalker-ransomware-gang-top-notch-affiliates/155946/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            78,
                            1146,
                            743,
                            19
                        ],
                        "objref": "195",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/dozens-of-ransomware-gangs-partner-with-hackers-to-extort-victims/ "
                        }
                    }
                ]
            },
            {
                "page": 15,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1204,
                            619,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            78,
                            1201,
                            743,
                            22
                        ],
                        "objref": "207",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bankinfosecurity.com/sodinokibi-ransomware-gang-appears-to-be-making-killing-a-13269 "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            81,
                            1201,
                            624,
                            19
                        ],
                        "objref": "208",
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/ "
                        }
                    }
                ]
            },
            {
                "page": 22,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1170,
                            533,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.infosecurity-magazine.com/news/manufacturing-ransomware-payments/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1187,
                            718,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1206,
                            529,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1167,
                            587,
                            23
                        ],
                        "objref": "251",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.infosecurity-magazine.com/news/manufacturing-ransomware-payments/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1184,
                            784,
                            19
                        ],
                        "objref": "252",
                        "action": {
                            "type": "URI",
                            "uri": "https://securityintelligence.com/posts/ransomware-2020-attack-trends-new-techniques-affecting-organizations-worldwide/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1203,
                            706,
                            20
                        ],
                        "objref": "253",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.techrepublic.com/article/top-5-business-sectors-targeted-by-ransomware/ "
                        }
                    }
                ]
            },
            {
                "page": 23,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1155,
                            643,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1091,
                            529,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1105,
                            734,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1074,
                            625,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/manufacturing-is-becoming-a-major-target-for-ransomware-attacks/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1174,
                            352,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securelist.com/ics-threat-predictions-for-2021/99613/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1120,
                            634,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            666,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1138,
                            492,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1152,
                            653,
                            20
                        ],
                        "objref": "260",
                        "action": {
                            "type": "URI",
                            "uri": "https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1088,
                            740,
                            35
                        ],
                        "objref": "261",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.dragos.com/blog/industry-news/ekans-ransomware-and-ics-operations/; https://www.fireeye.com/blog/threat-research/2020/07/financially-motivated-actors-are-expanding-access-into-ot.html   "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1071,
                            636,
                            20
                        ],
                        "objref": "262",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/manufacturing-is-becoming-a-major-target-for-ransomware-attacks/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1170,
                            727,
                            20
                        ],
                        "objref": "263",
                        "action": {
                            "type": "URI",
                            "uri": "https://securelist.com/ics-threat-predictions-for-2021/99613/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1117,
                            727,
                            20
                        ],
                        "objref": "264",
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1187,
                            732,
                            35
                        ],
                        "objref": "265",
                        "action": {
                            "type": "URI",
                            "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1135,
                            539,
                            19
                        ],
                        "objref": "266",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/ "
                        }
                    }
                ]
            },
            {
                "page": 24,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1166,
                            646,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1186,
                            653,
                            11
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1132,
                            570,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/kaspersky-north-korean-hackers-are-behind-the-vhd-ransomware/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            445,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.clearskysec.com/wp-content/uploads/2020/12/Pay2Kitten.pdf"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1149,
                            613,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1164,
                            653,
                            19
                        ],
                        "objref": "277",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1181,
                            727,
                            23
                        ],
                        "objref": "278",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/iranian-nation-state-hackers-linked-to-pay2key-ransomware/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1129,
                            727,
                            19
                        ],
                        "objref": "279",
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.scadafence.com/snake-/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            83,
                            1129,
                            572,
                            19
                        ],
                        "objref": "280",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/kaspersky-north-korean-hackers-are-behind-the-vhd-ransomware/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1198,
                            454,
                            28
                        ],
                        "objref": "281",
                        "action": {
                            "type": "URI",
                            "uri": "https://f.hubspotusercontent10.net/hubfs/5943619/Whitepaper-Downloads/Ransomware_in_ICS_Environments_Whitepaper_10_12_20.pdf "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1146,
                            624,
                            19
                        ],
                        "objref": "282",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/chinas-apt-hackers-move-to-ransomware-attacks/ "
                        }
                    }
                ]
            },
            {
                "page": 25,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1151,
                            559,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/?kA23Z000000KBro"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1167,
                            587,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            675,
                            1167,
                            167,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            599,
                            1184,
                            245,
                            11
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1070,
                            501,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1088,
                            712,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1103,
                            674,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "http://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            478,
                            1119,
                            364,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bankinfosecurity.com/nephilim-ransomware-gang-"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            306,
                            1134,
                            538,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1148,
                            653,
                            23
                        ],
                        "objref": "292",
                        "action": {
                            "type": "URI",
                            "uri": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/?kA23Z000000KBro "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1164,
                            769,
                            55
                        ],
                        "objref": "293",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/vpn-warning-revil-ransomware-targets-unpatched-pulse-secure-vpn-servers/; https://www.bleepingcomputer.com/news/security/black-kingdom-ransomware-hacks-networks-with-pulse-vpn-flaws/; https://www.bleepingcomputer.com/news/security/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1067,
                            727,
                            25
                        ],
                        "objref": "294",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.citrix.com/blogs/2020/01/24/citrix-releases-final-fixes-for-cve-2019-19781/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1085,
                            769,
                            63
                        ],
                        "objref": "295",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/; https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/; https://www.infosecurity-magazine.com/news/it-services-firm-conduent-felled/; https://www.bankinfosecurity.com/nephilim-ransomware-gang-tied-to-citrix-gateway-hacks-a-14480; https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp/  "
                        }
                    }
                ]
            },
            {
                "page": 26,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1154,
                            585,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1137,
                            436,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1172,
                            475,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            717,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1206,
                            532,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "http://www.bankinfosecurity.com/iranian-hackers-exploiting-unpatched-vulnerabilities-a-15001"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1151,
                            596,
                            23
                        ],
                        "objref": "303",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/zerologon-attack-lets-hackers-take-over-enterprise-networks/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1134,
                            636,
                            23
                        ],
                        "objref": "304",
                        "action": {
                            "type": "URI",
                            "uri": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1472 "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1169,
                            727,
                            23
                        ],
                        "objref": "305",
                        "action": {
                            "type": "URI",
                            "uri": "https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1187,
                            778,
                            40
                        ],
                        "objref": "306",
                        "action": {
                            "type": "URI",
                            "uri": "https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF; https://www.bankinfosecurity.com/iranian-hackers-exploiting-unpatched-vulnerabilities-a-15001 "
                        }
                    }
                ]
            },
            {
                "page": 27,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1097,
                            761,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1115,
                            669,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1132,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1151,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1184,
                            761,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://mybroadband.co.za/news/security/374310-ransomware-group-releases-data-after-attack-on-office-of-the-chief-justice.html"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1167,
                            613,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securityaffairs.co/wordpress/111654/cyber-crime/delaware-county-doppelpaymer-ransomware.html"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1201,
                            672,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1045,
                            446,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1064,
                            617,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.trendmicro.com/en_us/research/21/a/an-overview-of-the-doppelpaymer-ransomware.html"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1079,
                            701,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1094,
                            773,
                            22
                        ],
                        "objref": "314",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-sells-victims-data-on-darknet-if-not-paid/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1112,
                            680,
                            20
                        ],
                        "objref": "315",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1129,
                            680,
                            20
                        ],
                        "objref": "316",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1148,
                            680,
                            19
                        ],
                        "objref": "317",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1181,
                            773,
                            23
                        ],
                        "objref": "318",
                        "action": {
                            "type": "URI",
                            "uri": "https://mybroadband.co.za/news/security/374310-ransomware-group-releases-data-after-attack-on-office-of-the-chief-justice.html"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1164,
                            680,
                            23
                        ],
                        "objref": "319",
                        "action": {
                            "type": "URI",
                            "uri": "https://securityaffairs.co/wordpress/111654/cyber-crime/delaware-county-doppelpaymer-ransomware.html"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1198,
                            680,
                            22
                        ],
                        "objref": "320",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/foxconn-electronics-giant-hit-by-ransomware-34-million-ransom/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1044,
                            727,
                            19
                        ],
                        "objref": "321",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.crowdstrike.com/blog/doppelpaymer-ransomware-and-dridex-2/ "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1060,
                            769,
                            38
                        ],
                        "objref": "322",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.trendmicro.com/en_us/research/21/a/an-overview-of-the-doppelpaymer-ransomware.html; https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/ "
                        }
                    }
                ]
            },
            {
                "page": 28,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1175,
                            610,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.securityweek.com/fbi-warns-doppelpaymer-ransomware-targeting-critical-infrastructure"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1190,
                            307,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.ic3.gov/Media/News/2020/201215-1.pdf"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1207,
                            697,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.sensecy.com/2020/03/22/hackers-continue-to-exploit-the-covid-19-pandemic-in-malicious-campaigns/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1172,
                            772,
                            46
                        ],
                        "objref": "335",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.securityweek.com/fbi-warns-doppelpaymer-ransomware-targeting-critical-infrastructure; https://www.ic3.gov/Media/News/2020/201215-1.pdf "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1204,
                            708,
                            22
                        ],
                        "objref": "336",
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.sensecy.com/2020/03/22/hackers-continue-to-exploit-the-covid-19-pandemic-in-malicious-campaigns/ "
                        }
                    }
                ]
            },
            {
                "page": 29,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1206,
                            428,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/how-to-avoid-2020-online-shopping-threats/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1189,
                            495,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.washingtonpost.com/graphics/2020/world/coronavirus-2020-timeline/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            83,
                            1172,
                            199,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://time.graphics/line/386203"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1203,
                            436,
                            17
                        ],
                        "objref": "342",
                        "action": {
                            "type": "URI",
                            "uri": "https://blog.sensecy.com/2020/11/19/how-to-avoid-2020-online-shopping-threats/; https://www.cognyte.com/how-to-avoid-2020-online-shopping-threats/   "
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1186,
                            708,
                            25
                        ],
                        "objref": "343",
                        "action": {
                            "type": "URI",
                            "uri": "https://www.washingtonpost.com/graphics/2020/world/coronavirus-2020-timeline/"
                        }
                    },
                    {
                        "type": "Link",
                        "bounds": [
                            80,
                            1169,
                            208,
                            23
                        ],
                        "objref": "344",
                        "action": {
                            "type": "URI",
                            "uri": "https://time.graphics/line/386203"
                        }
                    }
                ]
            }
        ]
    },
    "created_at": "2023-04-03T08:33:21.563143Z",
    "updated_at": "2026-02-22T10:38:03.313974Z",
    "original_name": "Cognyte Ransomware Report.pdf",
    "uuid": "dabcafb6-505b-4797-9af2-b508c12f15f5",
    "description": "GLOBAL THREAT INTELLIGENCE REPORT The Ransomware Landscape March 2021 ",
    "is_high_quality_thumbnails_available": true,
    "conversion_type": "DOCUMENT"
}
Shortcut customizations

Lists are not currently supported in HTML input.

Shortcut customizations

Lists are not currently supported in HTML input.