Log in
Show password
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Dynamic quotes 
  1. Homepage
  2. Equities
  3. United States
  4. Nasdaq
  5. KnowBe4, Inc.
  6. News
  7. Summary
    KNBE   US49926T1043


SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector news

The State of Cyber Extortion Crime in South Africa The ransomware story is getting longer and more complicated and South African organisations are not excluded

12/07/2021 | 04:07am EST

The KnowBe4 (www.KnowBe4.com) and ITWeb Ransomware Survey took a deep look into the South African organisation, finding that ransomware and cybercrime are increasingly impacting organisations on the continent. While many companies (32%) were attacked in 2021, some multiple times (12%), 64% of organisations believe they are prepared, and 67% would not pay the ransom. According to Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa, the South African market with its growing economy and cyber dependence, is becoming increasingly tasty as a cyber extortion snack.

"It is natural for cybercriminal organisations to look at emerging economies for future attacks, as they are often not as prepared as the rest of the world," she adds. "Many South African sectors have a high cyber dependence and, as we have seen with recent attacks, such as the Department of Justice (DoJ) and Transnet, successful ransomware attacks have a direct impact on economy and infrastructure. Right now, organisations need to collaborate to increase preparedness."

This preparedness starts with understanding the landscape and recognising how successful extortion attacks can fundamentally impact the business bottom line, and the public sector’s service delivery. The public sector is concerned about its lack of preparedness — only 30% of the respondents in the public sector believed they were prepared enough — when it comes to cybersecurity training and systems, and this is one sector that cannot afford to lose money to a hack. The recent DoJ hack saw thousands of people affected, many in very dehumanising ways, as systems could not process death certificates, manage child support payments and effectively handle court proceedings. This is just one example of how long the tail of extortion crime can be.

"Ransomware, along with other types of extortion cybercrime, require a systemic response that is designed to prevent and mitigate its impact," says Collard. "Along with understanding how poor security and training can impact the business or public sector services, it is important to recognise how the process works and how professional these organisations have become."

Companies held to ransom are sent to "shaming sites" where they are then met with a landing page that has a countdown timer — how long they have to pay— and the amount they need to pay. They can then engage with the criminals to negotiate the ransom, receive payment instructions and get their data returned to them or a promise from the criminals that they will not release the stolen data.

The entire kill chain, from start to finish, follows a number of steps. First, one group is used to undertake the initial attack typically by using social engineering tactics such as phishing or by using insecure Microsoft Remote Desktop (MRDP) connections, password guessing or the exploitation of a software weakness to gain access to the network. Once inside, they move laterally across the environment, exfiltrating and encrypting as much data as possible. To add extra pressure, attacks can also include backup destruction, bribing of internal employees or combining the extortion with the threat of taking down systems via distributed denial of service attacks. Finally, negotiation for the ransom is handled by the ransomware operator.

"There are at last two parties involved in a typical case — the operators and their affiliate partners," says Collard. "Once the payment has been verified, the victim is sent the decryption tool and regains access to their data."

Research by Orange Cyber Defense has found that even though there are some countries and sectors that appear to be the most often attacked, there are victims in every country and sector. The U.S., Canada, France, UK, Germany and Italy are the most often attacked due to victim attractiveness following national GDP. Industries most consistently tracked on leak sites were manufacturing followed by professional scientific services and sectors with a strong reliance on technology.

"It does not matter what sector or country you are in, what matters is how weak your defences are," concludes Collard. "In South Africa, it is becoming incredibly important for companies to adequately prepare against this growing cyber extortion threat."

Distributed by APO Group on behalf of KnowBe4.

© African Press Organization, source Press Releases

All news about KNOWBE4, INC.
01/14KNOWBE4 : Is the Top Ranked Platform in G2's Winter 2022 Grid« Report for Security Awarene..
01/12KnowBe4 Wins 2022 Awards for Best Relationship, Best Value and Best Feature Set From Tr..
01/10KNOWBE4 : Is Recognized as a 2021 Gartner Peer InsightsTM Customers' Choice for Security A..
01/06Piper Sandler Adjusts Price Target on KnowBe4 to $31 From $35, Keeps Overweight Rating
2021KNOWBE4 : Launches Contest for The Biggest Fan of Popular Series “The Inside Man&rdq..
2021KnowBe4 Launches New “Security Masterminds” Podcast
2021KNOWBE4 : Named Number One Place Where Women Want to Work by #GirlsClub for Second Consecu..
2021KnowBe4 Releases Top 5 Cybersecurity Tips for the 2021 Holiday Season
2021KNOWBE4 : Great Place to Work« Names KnowBe4 One of the Best Workplaces for Parents™..
2021KNOWBE4 : to Offer $10,000 Women in Cybersecurity Scholarship and (ISC)2 Certification Edu..
More news
Analyst Recommendations on KNOWBE4, INC.
More recommendations
Financials (USD)
Sales 2021 244 M - -
Net income 2021 -16,9 M - -
Net cash 2021 266 M - -
P/E ratio 2021 -185x
Yield 2021 -
Capitalization 3 597 M 3 597 M -
EV / Sales 2021 13,6x
EV / Sales 2022 10,6x
Nbr of Employees 1 296
Free-Float -
Duration : Period :
KnowBe4, Inc. Technical Analysis Chart | KNBE | US49926T1043 | MarketScreener
Technical analysis trends KNOWBE4, INC.
Short TermMid-TermLong Term
Income Statement Evolution
Mean consensus BUY
Number of Analysts 12
Last Close Price 20,99 $
Average target price 31,83 $
Spread / Average Target 51,7%
EPS Revisions
Managers and Directors
Stu Sjouwerman Chairman & Chief Executive Officer
Krish Venkataraman Co-President & Chief Financial Officer
Lars Letonoff Co-President & Chief Revenue Officer
Gerhard Watzinger Independent Director
Kara Wilson Independent Director
Sector and Competitors
1st jan.Capi. (M$)
KNOWBE4, INC.-8.50%3 597
ADOBE INC.-8.19%247 701
SAP SE-3.54%162 325
SERVICENOW, INC.-18.19%105 670