In Zero Trust, CyberArk, Ransomware, Merlin Cyber, Qualys, ExtraHop, Veeam
This is the final installment of our ransomware blog series. We suggest reading "Understanding and Preventing Early Stages of Ransomware Attacks" and "Mid-Stage Ransomware Protection: Strengthening Security Against Privilege Escalation and Defense Evasion" before continuing on to this post.
As ransomware attacks progress into the later stages, attackers increasingly focus their TTPs on lateral movement, data collection, exfiltration, and disrupting operations through data encryption and destruction. With 70% of attacks resulting in sensitive data encryption and a five times increase in ransom bills over the last year (Sophos), the need to protect mission-critical data within federal agencies amidst mandates for improved efficiency is greater than ever. To effectively combat the advanced stages of ransomware attacks, agencies must focus their cybersecurity controls on identity and access management (IAM), Network Detection and Response (NDR), and data resiliency and recovery solutions from vendors like CyberArk, ExtraHop, and Veeam.
Attackers move laterally to spread across target networks using techniques like RDP, SMB/NTLM Relay, remote services, and pass-the-hash attacks.
Attackers collect and prepare data for exfiltration through sensitive data staging, clipboard data captures, and screen captures.
Attackers exfiltrate data via various channels like C2 channels, automated scripts, and web protocols.
Ransomware attackers inflict damage and demand payment by executing encryption, data destruction, system shutdowns, and double extortion tactics, leaking stolen data if the ransom is unpaid.
The advanced stages of ransomware attacks pose significant risks to federal agencies, with attacks leading to an average system downtime exceeding three weeks and recovery costs averaging $3.58 million for impacted organizations (Sophos). To protect the mission, federal agencies must adopt comprehensive cybersecurity strategies by integrating CyberArk’s IAM, Veeam’s data resiliency and recovery, Qualys’ vulnerability management, ExtraHop’s NDR, and InfoSec Global Federal’s cryptographic posture management solutions. Integrating these solutions enables a cohesive defense to strengthen resilience, mitigate risk and potential impact, and ensure fail-safe ransomware recovery to effectively maintain national security.
8330 BOONE BLVD, STE 800
Vienna, VA 22182
PH: 703-752-2928
Copyright 2025 Merlin International | Privacy Policy