Microsoft (SMBv3) Data Breach

Microsoft (SMBv3) experienced a data breach that was reported on February 10, 2022. A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerabilit

Key Facts

Organization
Microsoft (SMBv3)
Date Reported
February 10, 2022
Incident Type
ransomware
Industry
Technology
Severity Score
6/10
Confidence Level
high
Tags
ransomware

Source

View original source - External link to primary source documentation

Understanding ransomware Incidents

Ransomware attacks encrypt organizational data and demand payment for recovery. They often involve data exfiltration before encryption, enabling double extortion. Organizations should maintain offline backups and incident response plans.