{"id":1715,"date":"2021-10-26T18:21:10","date_gmt":"2021-10-26T18:21:10","guid":{"rendered":"https:\/\/cisobyte.com\/?p=1715"},"modified":"2021-10-26T18:21:53","modified_gmt":"2021-10-26T18:21:53","slug":"unhappy-halloween-ransomware-attackers-target-candy-manufacturer","status":"publish","type":"post","link":"https:\/\/cisobyte.com\/index.php\/2021\/10\/26\/unhappy-halloween-ransomware-attackers-target-candy-manufacturer\/","title":{"rendered":"Unhappy Halloween: Ransomware attackers target candy manufacturer."},"content":{"rendered":"<h4 style=\"text-align: left;\"><strong>CISObyte\u00a0 \u00a0 10-26-2021<\/strong><\/h4>\n<p>\u00a0<\/p>\n<h4>Never pay the ransom, that&#8217;s the same as paying the thief.<\/h4>\n<h2>One tactic is &#8220;understanding when is likely to be the victim&#8217;s busiest season that can least afford systems downtime and waiting until that has begun to launch their ransomware attack. After all, a compromised business that doesn&#8217;t detect the attacker on day 1 is unlikely to detect the attacker on day 90, especially if the attacker is simply waiting for the opportune time to launch their ransomware.&#8221;<\/h2>\n<p>Make sure you have good backups ready. Hackers will attack the backups, to, so ensure that offline backups are stored and available, and verify that restored data is intact and not infected.<\/p>\n<p>Make sure you have the talent and resources available, and that your organization is prepared with business continuity and disaster recovery plans. And never pay the ransom.<\/p>\n<ul>\n<li>Ransomware<\/li>\n<li>Cybersecurity<\/li>\n<li>Business Continuity Plan<\/li>\n<li>Disaster Recovery Plan<\/li>\n<\/ul>\n\n<div class=\"vlp-link-container vlp-template-default wp-block-visual-link-preview-link\">\n\t<a href=\"https:\/\/www.zdnet.com\/article\/illinois-candy-giant-hit-with-ransomware-weeks-before-halloween\/\" class=\"vlp-link\" title=\"Illinois candy giant hit with ransomware weeks before Halloween | ZDNet\" rel=\"nofollow\" target=\"_blank\"><\/a>\t\t<div class=\"vlp-link-image-container\">\n\t\t<div class=\"vlp-link-image\">\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/584468588f9384fcf52dff92bdb8a09475b05654\/2021\/10\/22\/e73fa29d-85a5-4a5f-9ab7-968e6d455722\/candy-factory.jpg?width=770&amp;height=578&amp;fit=crop&amp;auto=webp\" style=\"max-width: 600px; max-height: 600px\" \/>\t\t<\/div>\n\t<\/div>\n\t\t<div class=\"vlp-link-text-container\">\n\t\t\t\t<div class=\"vlp-link-title\">\n\t\t\tIllinois candy giant hit with ransomware weeks before Halloween | ZDNet\t\t<\/div>\n\t\t\t\t\t\t<div class=\"vlp-link-summary\">\n\t\t\tFerrara Candy told ZDNet it was hit with ransomware on October 9.\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Make sure you have the talent and resources available, and that your organization is prepared with business continuity and disaster recovery plans. And never pay the ransom.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[59,51,44],"tags":[58,8,57],"class_list":["post-1715","post","type-post","status-publish","format-standard","hentry","category-business-continuity-plan","category-cybersecurity","category-ransomware","tag-business-continuity-plan","tag-cybersecurity","tag-ransomware"],"_links":{"self":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/comments?post=1715"}],"version-history":[{"count":2,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1715\/revisions"}],"predecessor-version":[{"id":1717,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/posts\/1715\/revisions\/1717"}],"wp:attachment":[{"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/media?parent=1715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/categories?post=1715"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cisobyte.com\/index.php\/wp-json\/wp\/v2\/tags?post=1715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}