![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiE-hJDJwP_dVC57N76HSLNJGv2b_M_MjfOPOjGwSfhaheM4V1KnAyeYJ3UmrfA-nGCtxGv-KCXACr9chDx96Slc7dMW8-I9NDOqSNdjhtjcinks7s9efiC-u9Ke8CpMv-0WHOLv4OnUhRFI729-bYzUQ9XVbZvxS5iv2VLo1QAdwOzWh0XtNBi5PFdKIs/s1600/ransomware.jpg)
Between crossovers – Do threat actors play dirty or desperate?
In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover (meaning an affiliate has gone to
Source:: The Hackers News