{"id":47984,"date":"2022-08-10T10:35:07","date_gmt":"2022-08-10T10:35:07","guid":{"rendered":"http:\/\/ce18323a-679f-455a-9b5e-07a5f0cfa3a8"},"modified":"2022-08-10T10:35:07","modified_gmt":"2022-08-10T10:35:07","slug":"this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","title":{"rendered":"This company didn&#8217;t spot the flaw in their network. But three ransomware gangs did"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/\" alt=\"getty-hands-typing-on-a-laptop-keyboard.jpg\" height=\"800\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption readability=\"1\">\n<div class=\"c-CmsContent c-shortcodeImage_caption g-inner-spacing-right-small g-text-medium g-color-black\" readability=\"32\">\n<p>Hands typing on a laptop keyboard.<\/p>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>If you thought being hit by one ransomware attack was bad, try getting hit by three different ransomware gangs at the same time and each one encrypting files, sometimes multiple times over.<\/p>\n<p>That&#8217;s what happened to one organisation, <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/08\/09\/multiple-attackers-increase-pressure-on-victims-complicate-incident-response\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">as detailed by cybersecurity researchers at Sophos<\/a>, which fell victim to multiple different <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware attacks<\/a> within a short period of time.&nbsp;<\/p>\n<p>The unspecified target fell victim to three prominent forms of ransomware \u2013 <a href=\"https:\/\/www.zdnet.com\/article\/fbi-watch-out-for-lockbit-2-0-ransomware-heres-how-to-reduce-the-risk-to-your-network\/\" rel=\"follow\">LockBit<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/fbi-releases-alert-about-hive-ransomware-after-attack-on-hospital-system\/\" rel=\"follow\">Hive<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/blackcat-ransomware-targeting-us-european-retail-construction-and-transportation-orgs\/\" rel=\"follow\">BlackCat<\/a> \u2013 with each cyber criminal gang encrypting files and leaving their own ransom demand for a decryption key.&nbsp;<\/p>\n<p>According to analysis of the incidents, the first sign of suspicious activity occurred on December 2nd 2021, with an unknown attacker, possibly an <a href=\"https:\/\/www.zdnet.com\/article\/from-start-to-finish-how-the-initial-access-broker-market-leads-to-ransomware-attacks\/\" rel=\"follow\">initial access broker<\/a> \u2013 a malicious hacker who breaches networks and sells access to other cyber criminals \u2013 establishing a <a href=\"https:\/\/www.zdnet.com\/article\/big-jump-in-rdp-attacks-as-hackers-target-staff-working-from-home\/\" rel=\"follow\">remote desktop protocol<\/a> (RDP) session on the organisation&#8217;s domain controller&nbsp;for almost an hour.&nbsp;<\/p>\n<p>Nothing happened for months \u2013 but then on April 20th 2022 a LockBit ransomware affiliate gained access to the corporate network, likely through the same vulnerable RDP instance, and started to steal data from four systems, exfiltrating it to a cloud storage service &#8211; likely for the purposes of a <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-theres-been-a-big-rise-in-double-extortion-attacks-as-gangs-try-out-new-tricks\/\" rel=\"follow\">double extortion attack<\/a>.<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><a href=\"http:\/\/www.zdnet.com\/topic\/a-winning-strategy-for-cybersecurity\/?ftag=CMG-01-10aaa1b\" rel=\"follow\"><strong>A winning strategy for cybersecurity<\/strong><\/a><strong>&nbsp;(ZDNet special report)&nbsp;<\/strong><\/strong><\/p>\n<p>About a week later, the LockBit attacker was moving laterally around the network, using tools to steal passwords to gain access to additional systems and accounts in their quest to encrypt as many files and servers as possible.&nbsp;<\/p>\n<p>Within a few days, ransomware was executed across at least nineteen systems, encrypting data and dropping ransom notes onto each infected machine. But things only got worse from there as the organisation came under attack from other ransomware groups \u2013 with one striking under two hours later.&nbsp;<\/p>\n<p>This time, a cyber criminal operation using Hive ransomware gained access to the network, likely using the same RDP credentials used by the initial access broker and LockBit. The Hive affiliate worked quickly to access as many systems as possible, encrypting at least sixteen machines just 45 minutes later \u2013 some of these had already been encrypted by LockBit.&nbsp;<\/p>\n<p>It&#8217;s possible that the Hive attacker saw LockBit get deployed on the network and moved quickly to ensure that they could also attempt to make money from their own ransom demands.&nbsp;<\/p>\n<p>But that wasn&#8217;t the end of the ransomware attacks, because two weeks later a third ransomware group \u2013 BlackCat \u2013 also gained access to the network. The attackers moved around the network using stolen usernames and passwords before executing ransomware on several machines, encrypting data and dropping ransom notes.&nbsp;<\/p>\n<p>In addition to this, the BlackCat attackers attempted to clear the logs not only relating to their own activities, but also the actions of the LockBit and Hive attacks. It was after this third incident that Sophos was called in to help fix the situation.<\/p>\n<p>It&#8217;s unclear whether the multiple attacks were coordinated, or whether it was three separate attacks which just happened to exploit the same vulnerabilities to access the network, but researchers describe the multiple attacks as &#8220;a side effect of operating in an increasingly crowded and commoditised marketplace&#8221; &#8211; and something that can make things much more problematic for victims of attacks.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\"><strong>Ransomware: Why it&#8217;s still a big threat, and where the gangs are going next<\/strong><\/a><\/p>\n<p>Because not only are victims facing multiple adversaries, overlapping encryption and removal of data logs means it can be very difficult to recover from attacks \u2013 even if a ransom is paid.&nbsp;<\/p>\n<p>&#8220;It&#8217;s bad enough to get one ransomware note, let alone three. Multiple attackers create a whole new level of complexity for recovery, particularly when network files are triple encrypted,&#8221; said John Shier, senior security advisor at Sophos.&nbsp;<\/p>\n<p>&#8220;At some point, these groups will have to decide how they feel about cooperation\u2014whether to further embrace it or become more competitive\u2014but, for now, the playing field is open for multiple attacks by different groups,&#8221; he added.&nbsp;<\/p>\n<p>Falling victim to even just one ransomware attack and be devastating for an organisation and while it&#8217;s possible to recover \u2013 <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/\" rel=\"follow\">and without paying a ransom<\/a> \u2013 the best way to stay safe is by avoiding becoming a victim in the first place.&nbsp;<\/p>\n<p>That starts with enforcing <a href=\"https:\/\/www.zdnet.com\/article\/want-a-strong-password-youre-probably-still-doing-it-the-wrong-way\/\" rel=\"follow\">strong passwords<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" rel=\"follow\">multi-factor authentication<\/a> (MFA) across the network. As demonstrated in the incident above RDP and cloud services <a href=\"https:\/\/www.zdnet.com\/article\/why-cloud-security-matters-and-why-you-cant-ignore-it\/\" rel=\"follow\">can provide cyber criminals with an easy way into networks<\/a> because using legitimate credentials means they often go undetected \u2013 and many users still use easy-to-guess passwords. But by using a more complex password and applying multi-factor authentication, organisations can help protect accounts from being breached and exploited by cyber criminals.&nbsp;<\/p>\n<p>Another common method cyber criminals use to get into networks is <a href=\"https:\/\/www.zdnet.com\/article\/youve-still-not-patched-it-hackers-are-using-these-old-software-flaws-to-deliver-ransomware\/\" rel=\"follow\">exploiting unpatched vulnerabilities<\/a> \u2013 which means it&#8217;s vital for organisations to <a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" rel=\"follow\">apply security updates as soon as possible<\/a> to prevent known vulnerabilities with fixes from being abused to launch ransomware campaigns and other attacks.&nbsp;<\/p>\n<p>It&#8217;s also important for organisations to understand their network and be on the lookout for unusual or suspicious activity \u2013 <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-even-when-the-attackers-are-in-your-network-its-not-too-late-to-fight-back\/\" rel=\"follow\">picking this up early could prevent a ransomware attack<\/a>.&nbsp;<\/p>\n<p><strong>MORE ON CYBERSECURITY<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Triple-encrypted files are a difficult problem for anyone to solve.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47984","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>This company didn&#039;t spot the flaw in their network. But three ransomware gangs did 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This company didn&#039;t spot the flaw in their network. But three ransomware gangs did 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-10T10:35:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"This company didn&#8217;t spot the flaw in their network. But three ransomware gangs did\",\"datePublished\":\"2022-08-10T10:35:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\"},\"wordCount\":897,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\",\"name\":\"This company didn't spot the flaw in their network. But three ransomware gangs did 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\",\"datePublished\":\"2022-08-10T10:35:07+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This company didn&#8217;t spot the flaw in their network. But three ransomware gangs did\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This company didn't spot the flaw in their network. But three ransomware gangs did 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","og_locale":"en_US","og_type":"article","og_title":"This company didn't spot the flaw in their network. But three ransomware gangs did 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-08-10T10:35:07+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"This company didn&#8217;t spot the flaw in their network. But three ransomware gangs did","datePublished":"2022-08-10T10:35:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/"},"wordCount":897,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","url":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","name":"This company didn't spot the flaw in their network. But three ransomware gangs did 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","datePublished":"2022-08-10T10:35:07+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/","contentUrl":"https:\/\/www.zdnet.com\/article\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/this-company-didnt-spot-the-flaw-in-their-network-but-three-ransomware-gangs-did\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"This company didn&#8217;t spot the flaw in their network. But three ransomware gangs did"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47984"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47984\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}