{"id":17170,"date":"2021-10-20T12:23:00","date_gmt":"2021-10-20T11:23:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=17170"},"modified":"2021-10-25T12:34:23","modified_gmt":"2021-10-25T11:34:23","slug":"cyberattacks-in-2021-ransomwares-still-threat-n1","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/","title":{"rendered":"Cyberattacks in 2021: ransomwares, still threat n\u00b01"},"content":{"rendered":"\n<p style=\"text-align: justify;\">On the launch of the European Cybersecurity<strong>\u00a0Month and for the Assises de la S\u00e9curit\u00e9<\/strong>\u00a0(from 13 to 16 October 2021),\u00a0<strong>Wavestone unveils the new edition of its benchmark of cybersecurity incidents<\/strong>. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.<\/p>\n<p style=\"text-align: justify;\">This represents\u00a0<strong>60 major security incidents<\/strong>\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0<strong>to shed light on and show the evolution of the state of the cyber threats,\u00a0<\/strong>whilst also providing the keys for better anticipation and reaction.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A strong preponderance of ransomware in the panorama of cyberattacks<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1255\" height=\"505\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-25-132057.png\" alt=\"\" class=\"wp-image-17195\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-25-132057.png 1255w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-25-132057-437x176.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-25-132057-71x29.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-25-132057-768x309.png 768w\" sizes=\"auto, (max-width: 1255px) 100vw, 1255px\" \/><\/figure><\/div>\n\n\n\n<p>\u00a0\u00a0<\/p>\n<p style=\"text-align: justify;\">Ransomware accounts for<strong>\u00a060%<\/strong>\u00a0of the cyberattacks encountered by CERT-W for our customers. Furthermore, attackers are becoming increasingly more organized and skilled at carrying out more effective attacks<\/p>\n\n\n\n<p><em>&#8220;Cybercriminal groups have succeeded in their digital transformation and their organization into a platform has made it possible to majorly make their attacks more efficient and faster&#8221; Ger\u00f4me Billois, Partner Cybersecurity<\/em><\/p>\n\n\n\n<p style=\"text-align: justify;\">Beyond the simple blocking of the IS,\u00a0<strong>the combination with data theft is becoming more and more present<\/strong>. Indeed,\u00a0<strong>30%of the ransomware attacks observed\u00a0 include combine the blocking of the IS and the theft of data<\/strong>,\u00a0 the latter being an additional lever to obtain financial gains.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Faster and more targeted ransomware<\/strong>\u00a0<strong>attacks<\/strong><\/h2>\n\n\n\n<p style=\"text-align: justify;\">We see a reduction in the average time between initial access and deployment of ransomware in the system with<strong>\u00a0a minimum of 3 days for the fastest attack and an average of 25 days<\/strong>\u00a0on managed cases. Attackers are becoming\u00a0<strong>more and more determined to harm their victims<\/strong>.\u00a0 Indeed, they now go so far as to target and destroy the backup mechanisms \u00a0in order to force the payment of the ransom \u00a0(21% of \u00a0cases).<\/p>\n<p style=\"text-align: justify;\">We also find that in<strong>\u00a090% of cases data has been irretrievably lost.<\/strong>\u00a0It should be noted that \u00a0we are seeing a significant decrease in ransom payments this year (from 20% the previous year to 5% of cases). Multiple factors can \u00a0explain \u00a0this decrease, between the better understanding of the low interest to be paid \u00a0(the payment of the ransom does not accelerate the time of resolution of the crisis), the actions of awareness \u00a0and pressure on the payment intermediaries by the different authorities.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1125\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6.png\" alt=\"\" class=\"wp-image-17191\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6.png 2000w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6-340x191.png 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6-768x432.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6-1536x864.png 1536w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture6-800x450.png 800w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure><\/div>\n\n\n\n<p>\u00a0 \u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Other types of attacks are still raging in the background<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1974\" height=\"1076\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture7.png\" alt=\"\" class=\"wp-image-17193\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture7.png 1974w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture7-350x191.png 350w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture7-71x39.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture7-768x419.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture7-1536x837.png 1536w\" sizes=\"auto, (max-width: 1974px) 100vw, 1974px\" \/><\/figure><\/div>\n\n\n\n<div class=\"row-container onepage-section\" data-parent=\"true\" data-label=\"Parce qu'il est important de faire du maillage interne\" data-name=\"parce-quil-est-important-de-faire-du-maillage-interne\" data-section=\"5\">\n<div class=\"row limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell\">\n<div class=\"uncont no-block-padding col-custom-width\">\n<div class=\"uncode_text_column\">\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">The ransomware threat should not make us forget the attacks\u00a0<strong>of data theft, fraud and the gain in attack capacity that remain well present (25%)<\/strong>\u00a0even if they are less frequent. \u00a0<\/p>\n<p style=\"text-align: justify;\">When it comes to accessing channels to break into systems, the main gateways are still the\u00a0<strong>use of valid accounts (23%), fraudulent emails, \u00a0<em>phishing<\/em>\u00a0\u00a0to obtain information (20%) and remote access services using security vulnerabilities or configuration defects \u00a0(18%)<\/strong>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"6\">\n<div class=\"row limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell\">\n<div class=\"uncont no-block-padding col-custom-width\">\n<div class=\"heading-text el-text\">\n<h2 class=\"h2\">\u00a0<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How not to be an easy target? Some tips from CERT-W<\/strong><\/h2>\n\n\n\n<div class=\"uncode_text_column\">\n<p style=\"text-align: justify;\"><strong>56% of victims did not anticipate\u00a0<\/strong>being the\u00a0<strong>potential<\/strong>\u00a0<strong>target\u00a0 of a\u00a0<\/strong>\u00a0<strong>cyberattack.<\/strong> They \u00a0did not have an incident response contract or a cyber insurance and 42% of\u00a0 victims had not thought about \u00a0their resilience in the event of an attack<\/p>\n<\/div>\n\n\n\n<p>&#8220;Even if diplomatic and judicial actions have weakened the cybercriminal ecosystem, it is not a question of stopping efforts, we must prepare now thanks to simple actions to put in place&#8221; Nicolas Gauchard, Head of CERT-W<\/p>\n\n\n\n<div class=\"messagebox_text style-accent-bg\">\n<p><span style=\"color: #503078;\"><strong>The most important actions are known:<\/strong><\/span><\/p>\n<ol>\n<li><span style=\"color: #503078;\"><strong>Identify and protect the most critical systems and data, including mention technical systems such as Active \u00a0Directory<\/strong><\/span><\/li>\n<li><span style=\"color: #503078;\"><strong>Improve the efficiency of attack detection with a specialized 24\/7 service<\/strong><\/span><\/li>\n<li><span style=\"color: #503078;\"><strong>Know how to manage a major crisis by training through crisis management exercises<\/strong><\/span><\/li>\n<li><span style=\"color: #503078;\"><strong>Strengthen backup security and practice rebuilding immediately<\/strong><\/span><\/li>\n<li><span style=\"color: #503078;\"><strong>Subscribe to a cyber insurance and a contract with a specialized service in case of crisis<\/strong><\/span><\/li>\n<\/ol>\n<\/div>\n<p>\u00a0<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background\" href=\"\" style=\"background-color:#503078\" target=\"_blank\" rel=\"noreferrer noopener\">Download the publication<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background\" href=\"\" style=\"background-color:#503078\" target=\"_blank\" rel=\"noreferrer noopener\">Contact-us<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis&#8230;<\/p>\n","protected":false},"author":15,"featured_media":17143,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3273,3977],"tags":[3917,3480,3487,4012],"coauthors":[837,4008],"class_list":["post-17170","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking-indicent-response-en","category-focus","tag-benchmark-en","tag-cert-en","tag-cert-w-en","tag-incident-response"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberattacks in 2021: ransomwares, still threat n\u00b01 - RiskInsight<\/title>\n<meta name=\"description\" content=\"On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.This represents\u00a060 major security incidents\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0to shed light on and show the evolution of the state of the cyber threats,\u00a0whilst also providing the keys for better anticipation and reaction.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberattacks in 2021: ransomwares, still threat n\u00b01 - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.This represents\u00a060 major security incidents\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0to shed light on and show the evolution of the state of the cyber threats,\u00a0whilst also providing the keys for better anticipation and reaction.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-20T11:23:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-25T11:34:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"568\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois, Nicolas Gauchard\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois, Nicolas Gauchard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"Cyberattacks in 2021: ransomwares, still threat n\u00b01\",\"datePublished\":\"2021-10-20T11:23:00+00:00\",\"dateModified\":\"2021-10-25T11:34:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\"},\"wordCount\":618,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg\",\"keywords\":[\"benchmark\",\"CERT\",\"CERT-W\",\"Incident response\"],\"articleSection\":[\"Ethical Hacking &amp; Incident Response\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\",\"name\":\"Cyberattacks in 2021: ransomwares, still threat n\u00b01 - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg\",\"datePublished\":\"2021-10-20T11:23:00+00:00\",\"dateModified\":\"2021-10-25T11:34:23+00:00\",\"description\":\"On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.This represents\u00a060 major security incidents\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0to shed light on and show the evolution of the state of the cyber threats,\u00a0whilst also providing the keys for better anticipation and reaction.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg\",\"width\":850,\"height\":568},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberattacks in 2021: ransomwares, still threat n\u00b01\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberattacks in 2021: ransomwares, still threat n\u00b01 - RiskInsight","description":"On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.This represents\u00a060 major security incidents\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0to shed light on and show the evolution of the state of the cyber threats,\u00a0whilst also providing the keys for better anticipation and reaction.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/","og_locale":"en_US","og_type":"article","og_title":"Cyberattacks in 2021: ransomwares, still threat n\u00b01 - RiskInsight","og_description":"On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.This represents\u00a060 major security incidents\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0to shed light on and show the evolution of the state of the cyber threats,\u00a0whilst also providing the keys for better anticipation and reaction.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/","og_site_name":"RiskInsight","article_published_time":"2021-10-20T11:23:00+00:00","article_modified_time":"2021-10-25T11:34:23+00:00","og_image":[{"width":850,"height":568,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois, Nicolas Gauchard","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois, Nicolas Gauchard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"Cyberattacks in 2021: ransomwares, still threat n\u00b01","datePublished":"2021-10-20T11:23:00+00:00","dateModified":"2021-10-25T11:34:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/"},"wordCount":618,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg","keywords":["benchmark","CERT","CERT-W","Incident response"],"articleSection":["Ethical Hacking &amp; Incident Response","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/","name":"Cyberattacks in 2021: ransomwares, still threat n\u00b01 - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg","datePublished":"2021-10-20T11:23:00+00:00","dateModified":"2021-10-25T11:34:23+00:00","description":"On the launch of the European Cybersecurity\u00a0Month and for the Assises de la S\u00e9curit\u00e9\u00a0(from 13 to 16 October 2021),\u00a0Wavestone unveils the new edition of its benchmark of cybersecurity incidents. \u00a0To this end, we reviewed the interventions of the CERT-Wavestone crisis management team between September 2020 and October 2021.This represents\u00a060 major security incidents\u00a0that led to business interruption or advanced IS compromise in a diverse sector: \u00a0industry, public sector, agri-food, information technology, finance, etc. The objective of this benchmark is\u00a0to shed light on and show the evolution of the state of the cyber threats,\u00a0whilst also providing the keys for better anticipation and reaction.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/10\/Picture1-1.jpg","width":850,"height":568},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/10\/cyberattacks-in-2021-ransomwares-still-threat-n1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyberattacks in 2021: ransomwares, still threat n\u00b01"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=17170"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17170\/revisions"}],"predecessor-version":[{"id":17198,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/17170\/revisions\/17198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/17143"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=17170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=17170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=17170"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=17170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}