target audience: TECH SUPPLIER Publication date: Oct 2023 - Document type: IDC Survey Spotlight - Doc Document number: # US51284423
Does the Source of the Ransomware Initial Compromise Relate to the Successful Destruction of the Backups by the Attacker?
Content
- 2 slides
Get More
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.
Related Links
Abstract
This IDC Survey Spotlight looks at the source of the ransomware initial compromise related to the successful destruction of the backups by the attacker.
IDC has seen across its ransomware studies over time that attackers are increasingly likely to attack backup files and delete or destroy them. Successfully attacking backups is hard though; "smash and grab" techniques don't work well. Attackers need to be sophisticated and patient to be successful. Higher-value targets are more likely to motivate attackers to invest the time to successfully delete or destroy the backups. It makes sense then that more sophisticated attack techniques would correlate with successful backup deletion.