As cyber security professionals come to understand the current ransomware threat and vendors and MSPs provide services and training to deal with the threat – the threat actors will always change their tactics.
Here is one of the latest – using torrents to extract data from compromised systems:
Clop ransomware now uses torrents to leak data and evade takedowns – Bleeping Computer
Our SOC-as-a-Service (which starts at just £10) detects torrent activity and ransomware “indicators of compromise” – this is the type of cyber security responsible managers deploy. It will not spot everything – and do not let anyone tell you there is a 100% solution for cyber crime (and I have sat in vendor presentations where this has happened) but it does pick up on the small things that ransomeware attackers have to do and once detected our 24/7 all the year round experts can react for you.
Clive Catton MSc (Cyber Security) – by-line and other articles