{"id":48748,"date":"2022-10-05T12:13:52","date_gmt":"2022-10-05T12:13:52","guid":{"rendered":"http:\/\/048d0e79-59c6-41a4-bc74-ad276b61fe24"},"modified":"2022-10-05T12:13:52","modified_gmt":"2022-10-05T12:13:52","slug":"ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/","title":{"rendered":"Ransomware: This is how half of attacks begin, and this is how you can stop them"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/25937e9e601d8db87fe7b255a1b3c6430e660bc7\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=768\" alt=\"gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/452764bdf8ce61eb71a7744b6eef45f06dec8ebe\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1024\" alt=\"gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\" alt=\"gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\" alt=\"gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg\" height=\"800\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>Over half of ransomware attacks now begin with criminals exploiting vulnerabilities in remote and internet-facing systems as hackers look to take advantage of unpatched cybersecurity issues.&nbsp;<\/p>\n<p>According to analysis of <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware incidents<\/a>&nbsp;during the past year <a href=\"https:\/\/www.secureworks.com\/blog\/2022-state-of-the-threat-a-year-in-review\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">by researchers at security company Secureworks,<\/a> 52% of attacks started with malicious hackers exploiting remote services.&nbsp;<\/p>\n<p>Vulnerabilities in internet-facing applications have become the most common attack vector for ransomware operations. Often, these internet-facing applications are standard across enterprise environments around the world, making them a very tempting target for malicious hackers.&nbsp;<\/p>\n<p>These applications and services could be internet-facing because organisations need them to <a href=\"https:\/\/www.zdnet.com\/article\/dont-let-your-cloud-cybersecurity-choices-leave-the-door-open-for-hackers\/\" rel=\"follow\">enable employees to work remotely<\/a> \u2013 or organisations might not even be aware that these applications are exposed to the internet at all.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/the-scary-future-of-the-internet-how-the-tech-of-tomorrow-will-pose-even-bigger-cybersecurity-threats\/\" rel=\"follow\">The scary future of the internet: How the tech of tomorrow will pose even bigger cybersecurity threats<\/a><\/p>\n<p>According to Secureworks, some of vulnerabilities that have been used to launch ransomware attacks include <a href=\"https:\/\/www.zdnet.com\/article\/hive-hackers-are-exploiting-microsoft-exchange-servers-in-ransomware-spree\/\" rel=\"follow\">vulnerabilities in Microsoft Exchange Server<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/critical-security-alert-if-you-havent-patched-this-two-year-old-vpn-vulnerability-assume-your-network-is-compromised\/\" rel=\"follow\">vulnerabilities in Fortinet VPNs<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/red-cross-traces-hack-back-to-zoho-vulnerability\/\" rel=\"follow\">a vulnerability in Zoho ManageEngine ADSelfService Plus<\/a>, and more \u2013 all of which have official fixes available from vendors.&nbsp;<\/p>\n<p>But even when security patches have been made available, many organisations remain vulnerable to the exploits because the update doesn&#8217;t get applied. &nbsp;<\/p>\n<p>That&#8217;s particularly the case when the vulnerability is newly disclosed and <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-exchange-server-attacks-theyre-being-hacked-faster-than-we-can-count-says-security-company\/\" rel=\"follow\">cyber criminals are moving as quickly as possible to exploit it<\/a> before patches are made available and organisations have had the chance to apply them.&nbsp;<\/p>\n<p>&#8220;Even where a patch exists, the process of patching a vulnerability in an enterprise environment is far more complex and slower than the process for threat actors or OST [offensive security tool] developers of weaponising publicly available exploit code,&#8221; warns the report.&nbsp;<\/p>\n<p>Patching can be a laborious and cumbersome process, but it&#8217;s still vital to help protect against ransomware and other malware attacks that target vulnerabilities in services exposed to the internet.&nbsp;<\/p>\n<p>While over half of ransomware incidents examined started with attackers exploiting internet-facing vulnerabilities, compromised credentials \u2013 usernames and passwords \u2013 were the entry point for 39% of incidents.&nbsp;<\/p>\n<p>There are several ways that usernames and passwords can be stolen, including <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\">phishing attacks<\/a> or infecting users with <a href=\"https:\/\/www.zdnet.com\/article\/this-windows-malware-aims-to-steal-your-social-media-passwords\/\" rel=\"follow\">information-stealing malware<\/a>. It&#8217;s also common for attackers to simply breach <a href=\"https:\/\/www.zdnet.com\/article\/dont-use-these-passwords-these-are-the-most-popular-log-in-details-found-for-sale-online\/\" rel=\"follow\">weak or common passwords<\/a> with brute-force attacks.&nbsp;<\/p>\n<p>Other methods that cyber criminals have used as the initial entry point for ransomware attacks include malware infections, phishing, drive-by downloads, and exploiting network misconfigurations.&nbsp;<\/p>\n<p>No matter which method is used to initiate ransomware campaigns, the report warns that &#8220;ransomware remains a major threat and one that feeds on gaps in security control frameworks&#8221;.&nbsp;<\/p>\n<p><strong>Also:<\/strong>&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\">Ransomware: Why it&#8217;s still a big threat, and where the gangs are going next<\/a><\/p>\n<p>Despite the challenges that can be associated with preparing for ransomware and other malicious cyber threats \u2013 especially in large enterprise environments \u2013 Secureworks researchers suggest that&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" rel=\"follow\">applying security patches is one of the key things organisations can do<\/a> to help protect their networks.&nbsp;<\/p>\n<p>Another form of protection that researchers say should be applied to help prevent ransomware attacks is <a href=\"https:\/\/www.zdnet.com\/article\/better-than-the-best-password-how-to-use-2fa-to-improve-your-security\/\" rel=\"follow\">multi-factor authentication<\/a> (MFA). &nbsp;<\/p>\n<p>By applying MFA, particularly to applications and accounts that access critical services, it becomes much more difficult for cyber criminals to enter and move around the network \u2013 even if they have the correct password. Steps like this can be a significant force in <a href=\"https:\/\/www.zdnet.com\/article\/why-you-really-need-multi-factor-authentication-these-ransomware-hackers-gave-up-when-they-saw-it\/\" rel=\"follow\">disrupting ransomware attacks before they even start<\/a>.&nbsp;<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers warn that attackers are mostly using two different techniques to break into systems.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48748","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: This is how half of attacks begin, and this is how you can stop them 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: This is how half of attacks begin, and this is how you can stop them 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T12:13:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware: This is how half of attacks begin, and this is how you can stop them\",\"datePublished\":\"2022-10-05T12:13:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/\"},\"wordCount\":599,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b691d3544e3da4eda9f719101e9729193b212552\\\/2021\\\/12\\\/13\\\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\\\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/\",\"name\":\"Ransomware: This is how half of attacks begin, and this is how you can stop them 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b691d3544e3da4eda9f719101e9729193b212552\\\/2021\\\/12\\\/13\\\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\\\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-10-05T12:13:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b691d3544e3da4eda9f719101e9729193b212552\\\/2021\\\/12\\\/13\\\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\\\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/b691d3544e3da4eda9f719101e9729193b212552\\\/2021\\\/12\\\/13\\\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\\\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: This is how half of attacks begin, and this is how you can stop them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: This is how half of attacks begin, and this is how you can stop them 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: This is how half of attacks begin, and this is how you can stop them 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-05T12:13:52+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware: This is how half of attacks begin, and this is how you can stop them","datePublished":"2022-10-05T12:13:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/"},"wordCount":599,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/","name":"Ransomware: This is how half of attacks begin, and this is how you can stop them 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200","datePublished":"2022-10-05T12:13:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/b691d3544e3da4eda9f719101e9729193b212552\/2021\/12\/13\/6af65f57-2326-4a2f-9f6f-035fd5fbd2db\/gettyimages-close-up-of-fingers-typing-on-glowing-red-backlight-keys-on-a-computer-keyboard.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-this-is-how-half-of-attacks-begin-and-this-is-how-you-can-stop-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware: This is how half of attacks begin, and this is how you can stop them"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48748"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48748\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}