•   sales@dolos.africa
  • +27 21 683 3899
DolosDolosDolosDolos
  • Home
  • Solutions
    • Endpoint Security
      • Endpoint Protection
      • Endpoint Detection & Response
      • Add-on Modules
      • DNS Protection
    • Advanced Endpoint Security
      • Advanced EDR & EPDR
      • Threat Hunting Platform
      • Add-on Modules
      • MDR
    • XDR – Unified Security
    • Network Security
    • Multi-Factor Authentication
    • Secure Wi-Fi
    • Document Security
    • RMM Solutions
    • Cyber Assessment
  • Partners
  • News
    • Blog
    • Press Office
  • Support
  • About Us
  • Contact

Beyond the Breach: What A Ransomware Gang Taught the Cybersecurity Industry

    Home Advanced Endpoint Security Beyond the Breach: What A Ransomware Gang Taught the Cybersecurity Industry

    Beyond the Breach: What A Ransomware Gang Taught the Cybersecurity Industry

    By Andrea Kemsley | Advanced Endpoint Security, Endpoint Detection & Response, Multi-Factor Authentication, Network Security | Comments are Closed | 6 October, 2025 | 0

    What is ransomware?

    In 2025, ransomware is no longer just malicious software that encrypts your machines. It has morphed into something more dangerous: extortion built on stolen data. Attackers don’t stop at locking files; they now harvest sensitive information from SaaS platforms and internal networks, giving them leverage far beyond encryption keys. And their threats aren’t confined to dark web leaks. Increasingly, they pressure victims by threatening to expose data directly to regulators, insurers, or even customers. It’s not just about endpoint security anymore — it’s about protecting the entire cloud and network environment your business runs on.

    So far this year, 4,441 organisations have been publicly listed as ransomware victims. More than 51% of those paid, according to Cybersecurity Ventures, resulting in roughly 2,268 ransom payments, with median payments averaging $1 million per breach. That puts ransomware payouts this year well into the multi-billion-dollar range.

    And these attacks aren’t just hitting small or midsize companies. In July, global IT distributor Ingram Micro confirmed a ransomware-related incident that disrupted internal systems and order fulfilment. While the company quickly mobilised cybersecurity experts and notified law enforcement, the attack demonstrated a growing truth: no organisation is immune.

    A Ransom Note… and a Checklist to Keep Them Away

    The Akira ransomware gang doesn’t just extort. They operate with the polish of a support team and the gall to offer post-attack “advice”.

    In a real negotiation transcript, Akira encrypted an organisation’s systems, demanded $600,000 and ultimately settled for $200,000. But their final message didn’t just include a decryption tool, it came with a security checklist.

    “Don’t want us to hack you again? Here’s what you need to do”.

    Their advice included:

    • Don’t open suspicious emails or run unknown files
    • Use strong passwords, changed monthly
    • Enable 2FA
    • Keep systems and software updated
    • Monitor traffic and use antivirus
    • Create VPN jump hosts with unique credentials
    • Train your employees: “The human factor is your weakest point”.

    They signed off with this unsettling note: “We wish you safety, calmness, and lots of benefits in the future”.

    You Shouldn’t Need a Ransom Note to Discover What’s Broken

    What’s most disturbing isn’t what Akira did, it’s that they’re right. Too many organisations only discover their security gaps after a breach. That needs to change.

    Here’s what real cyber resilience looks like in 2025:

    • Advanced Endpoint Detection and Response
      Lock down apps, enforce endpoint firewalls, and automate patching with platforms like WatchGuard EPDR, so attackers can’t exploit known weaknesses.
    • Smarter MFA Everywhere
      Strengthen authentication with custom MFA solutions like AuthPoint, designed to secure not only cloud apps and VPN access, but also device-level login like Windows. This closes a critical gap in most identity strategies.
    • ZTNA and SASE-Based Protections
      Adopt Zero Trust Network Access (ZTNA) and SASE-based firewalls to filter cloud services (like Microsoft 365) and restrict access to only validated connections. This helps eliminate the common VPN jump host vector attackers rely on.
    • Segment Your Networks
      Use your firewall to isolate sensitive systems. Separate user traffic from management networks with tools like WatchGuard FireCloud, keeping your most privileged controls walled off.
    • Keep Firewalls Current
      A firewall isn’t a “set it and forget it” tool; it’s only as effective as its latest update. No matter which vendor you use, regularly updating firmware and security services ensures your defences evolve alongside attackers. Neglecting updates leaves cracks in the wall that adversaries are quick to exploit. Modern tabletop firewalls, for example, are built to deliver strong protection, but only when they’re kept current.

    If you’re a managed service provider (MSP) or cybersecurity partner supporting customers through this evolving threat landscape, helping them mature across these areas is no longer optional, it’s your differentiator. Whether you’re building custom offerings or scaling a managed security practice, you shouldn’t have to do it alone.

    What Real Security Looks Like

    The Akira case is both a glimpse into the future and a warning about the present. You don’t just need better tools. You need a complete strategy that works in real life.

    WatchGuard solutions help both organisations and partners deliver Real Security for the Real World, built for imperfect environments, tight budgets, and complex demands.

    Our Unified Security Platform®, combined with 24/7 MDR services, helps you prevent, detect and respond before attackers make the first move. Don’t wait to learn from your attacker. Take the first step toward stronger cybersecurity – contact the Dolos team for more details.

    Contact us
    Unified Security Platform
    WatchGuard Technologies

    Related Post

    • Eight Cybersecurity Tips Ready for Retirement

      By Andrea Kemsley | Comments are Closed

      When it comes to cybersecurity, if you are not evolving, you are almost certainly falling behind and becoming vulnerable. Yet some old cybersecurity tips and best practices continue to live on long after they shouldRead more

    • Secure your Organisation Against Phishing Attacks

      By Andrea Kemsley | Comments are Closed

      Phishing attacks continue to be a top concern for small businesses and midsize organisations. In fact, 83% of businesses report being a victim of a phishing attack in the last year alone. This is notRead more

    • 5 Cybersecurity Seeds to Plant for a Secure Tomorrow

      By Andrea Kemsley | Comments are Closed

      Building a Secure Foundation Is a Lot Like Gardening Building strong cybersecurity doesn’t require fancy tools or a Hollywood-style war room. Often, it just takes the basics ‒ done really well. Think of it like gardening:Read more

    • The Top Cyber Challenges in an Increasingly Digital World

      By Andrea Kemsley | Comments are Closed

      2025 could be the most challenging year yet for the digital environment. As emerging factors such as the duality of AI, the rise in cybercrime, or the shortage of cybersecurity talent impact business, we askRead more

    • How to Improve Cybersecurity in the Healthcare Sector

      By Andrea Kemsley | Comments are Closed

      Over the last two years, the healthcare sector has been the number 1 target for hackers who have attempted to attack health centres or even the health department of an entire country. The industry faces threats suchRead more

    Recent Posts

    • 7 November, 2025
      0

      Nurturing Cybersecurity Growth

    • 6 October, 2025
      Comments Off on Beyond the Breach: What A Ransomware Gang Taught the Cybersecurity Industry

      Beyond the Breach: What A Ransomware Gang Taught the Cybersecurity Industry

    • 2 September, 2025
      Comments Off on 5 Cybersecurity Seeds to Plant for a Secure Tomorrow

      5 Cybersecurity Seeds to Plant for a Secure Tomorrow

    • 7 August, 2025
      Comments Off on Cyberattacks on Tech Providers Hit 183,000 Companies in 2024

      Cyberattacks on Tech Providers Hit 183,000 Companies in 2024

    Categories

    • Add-on Modules
    • Advanced Endpoint Security
    • Channel Partner Program
    • DNS Protection
    • Endpoint Detection & Response
    • Endpoint Protection
    • Multi-Factor Authentication
    • Network Security
    • Secure Wi-Fi
    • Unified Security

    Tags

    Adaptive Defense Adaptive Defense 360 AuthPoint Cybersecurity Culture DNSWatchGo Endpoint Security Panda Security Patch Management Premium Threat Hunting Service Threat Hunting Platform WatchGuard WatchGuardONE WatchGuard Technologies
    • Dax Data Logo
    •   Unit 1 Melomed Office Park
      Punters Way
      Kenilworth
      Cape Town
      7708
    •   +27 21 683 3899
    •   sales@dolos.africa

    Useful Links

    • Solutions
    • Contact
    • Partners
    • Support

    News

    • Nurturing Cybersecurity Growth

      Why Culture is the Soil, not the Fence Let’s be honest —

      7 November, 2025
    • Beyond the Breach: What A Ransomware Gang Taught the Cybersecurity Industry

      What is ransomware? In 2025, ransomware is no longer just malicious software

      6 October, 2025
    Copyright © 2025 Dolos. All Rights Reserved.  |  Privacy Policy
    • Home
    • Solutions
      • Endpoint Security
        • Endpoint Protection
        • Endpoint Detection & Response
        • Add-on Modules
        • DNS Protection
      • Advanced Endpoint Security
        • Advanced EDR & EPDR
        • Threat Hunting Platform
        • Add-on Modules
        • MDR
      • XDR – Unified Security
      • Network Security
      • Multi-Factor Authentication
      • Secure Wi-Fi
      • Document Security
      • RMM Solutions
      • Cyber Assessment
    • Partners
    • News
      • Blog
      • Press Office
    • Support
    • About Us
    • Contact
    Dolos
    Contact us for more information