Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senio...

Channel:
Subscribers:
4,680
Published on ● Video Link: https://www.youtube.com/watch?v=UOIa3psNLIg



Duration: 0:00
3 views
1


At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company’s latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.


Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.


The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.


Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.


The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.


The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year’s findings.


Learn more about Zscaler: https://itspm.ag/zscaler-327152


Note: This story contains promotional content. Learn more (https://www.itspmagazine.com/their-infosec-story) .


Guest:


Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/


Resources


Learn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler


Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs


Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/


Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up


Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story


Keywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler




Other Videos By ITSPmagazine


2025-08-20We're Becoming Dumb and Numb": Why Black Hat 2025's AI Hype Is Killing Cybersecurity -- And Our A...
2025-08-20We're Becoming Dumb and Numb: Why Black Hat 2025's AI Hype Is Killing Cybersecurity -- And Our Ab...
2025-08-20We're Becoming Dumb and Numb": Why Black Hat 2025's AI Hype Is Killing Cybersecurity -- And Our A...
2025-08-20We're Becoming Dumb and Numb: Why the AI Hype Is Killing Cybersecurity (And Our Ability to Think)
2025-08-18When Cybersecurity Lost the Ability to Detect Its Own Deception | BlackHat USA 2025 Infosec & Tech
2025-08-18The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and...
2025-08-18The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and...
2025-08-18The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and...
2025-08-15When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | ...
2025-08-14Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are | Deidre Diamond and Carraig Stanwyck
2025-08-14Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senio...
2025-08-14Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senio...
2025-08-14Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are | A Brand Story with Deidre Diamond,...
2025-08-14Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are | A Brand Story with Deidre Diamond,...
2025-08-13Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar
2025-08-13Automate Cybersecurity Operations w/out Coding, Crying, or Calling IT at 2 AM | Mike Wayne, BlinkOps
2025-08-13How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Bran...
2025-08-13How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Bran...
2025-08-13Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chie...
2025-08-13Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chie...
2025-08-13Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cyber...