"black hat europe 2025 : reputation matters – even in the ransomware economy black hat europe 2025 opened with a presentation by max smeets of virtual rotes titled ‘ inside the ransomware machine ’. the talk focused on the lockbit ransomware - as - a - service ( raas ) gang and ma…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
95%
"clean. the ransomware decryption key unlocking the business in hours rather than days can minimize business disruption and loss of revenue. then also factor in the influence of an insurance underwriter, who too will want to minimize their costs and take the path that minimizes an…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
94%
"negotiation to unlock systems and ensure the security of the data needs to be from a trust standpoint. if the negotiator has heard negative reviews on the ransomware group not providing decryptors or holding onto data, they may advise the victim not to pay. it ’ s important that …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
90%
"research showed that media coverage is greater for the companies that pay as opposed to those that don ’ t pay the extortion demand and face longer disruption. the presenter ’ s view is that the news story becomes about the payment and potentially gives the indication the victim …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
46%
"research showed that media coverage is greater for the companies that pay as opposed to those that don ’ t pay the extortion demand and face longer disruption. the presenter ’ s view is that the news story becomes about the payment and potentially gives the indication the victim …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1490Inhibit System Recovery
45%
"clean. the ransomware decryption key unlocking the business in hours rather than days can minimize business disruption and loss of revenue. then also factor in the influence of an insurance underwriter, who too will want to minimize their costs and take the path that minimizes an…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
38%
"clean. the ransomware decryption key unlocking the business in hours rather than days can minimize business disruption and loss of revenue. then also factor in the influence of an insurance underwriter, who too will want to minimize their costs and take the path that minimizes an…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1490Inhibit System Recovery
37%
"negotiation to unlock systems and ensure the security of the data needs to be from a trust standpoint. if the negotiator has heard negative reviews on the ransomware group not providing decryptors or holding onto data, they may advise the victim not to pay. it ’ s important that …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1657Financial Theft
30%
"negotiation to unlock systems and ensure the security of the data needs to be from a trust standpoint. if the negotiator has heard negative reviews on the ransomware group not providing decryptors or holding onto data, they may advise the victim not to pay. it ’ s important that …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Being seen as reliable is good for ‘business’ and ransomware groups care about 'brand reputation' just as much as their victims