High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020 - Attivo Networks
Attivo Networks Blogs

High-tech heist: why fending off ransomware attacks is more challenging than ever in 2020

Have you followed recent news reports on the cyber-attacks suffered by Lion and fervently hoped your organisation wouldn’t be next in the firing line?

The beverage and dairy giant hit the headlines in June after it emerged that an attack had forced it temporarily to shut down production. Later the same month, the perpetrators threatened to post confidential company data on the dark web, if the company did not pay a reported ransom of AU$1 million.

Other companies may find themselves in the same unenviable position before too long, as cyber-criminals step up their efforts to hijack operations and extort significant sums, in exchange for unlocking crippled systems or handing back sensitive corporate and customer data.

So much so that, also in June, Prime Minister Scott Morrison took the extraordinary step of advising Australian organisations to be on their guard against targeted attacks by a sophisticated, state-based cyber-actor.

“It is vital that Australian organisations are alert to this threat and take steps to enhance the resilience of their networks,” the Prime Minister said in a statement.

Read the complete article in SecurityBrief Australia by Attivo Networks regional director for A/NZ Jim Cook.


Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Ready to find out what’s lurking in your network?

Scroll to Top