Cybercrime , Cybercrime as-a-service , Endpoint Security

Ransomware Groups Pursue Fresh Monetization Strategies

Kela's Steve Rivers Sees Ransomware Groups Using New Techniques to Extract Ransoms
Steve Rivers, vice president, sales engineering and customer success, kela

Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.

See Also: The State of Organizations' Security Posture as of Q1 2018

In a video interview with Information Security Media Group at RSA Conference 2022, Rivers also discusses:

  • How cybercrime groups continue to adapt to global conditions, including the Russia-Ukraine war;
  • How data stolen in previous breaches continues to be re-batched and reused;
  • The evolution of the initial access broker ecosystem.

Rivers, who focuses on sales engineering and customer success at Kela, previously served as a sales engineering director and threat intelligence engineer at ThreatQuotient and business development lead for security at Cisco. Prior to that, he worked as a consultant and professional services employee for Sourcefire and Tripwire.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.