Skip to main content
01 Sep 2022

How Ransomware Infiltrates Your Backups

SLEEPER ATTACKS

Dormant ransomware is implanted in otherwise normal files so that it’s simply backed up into your immutable and air-gapped backups. Malware can also be buried in complex files, hidden from the most advanced antimalware scanning. Weeks or months may pass before the ransomware encrypts the live network. However, when the backups are restored, you’ll find they too are now infected too, and you’re caught in an attack loop, and the ransom must be paid.

View all Exhibitor Videos
Loading