Threat Actors using TOR to exfiltrate data

Once inside your network, threat actors use tools to exfiltrate data in order to create a ransom using double extortion. In a double extortion situation, the first step is encrypting your data and locking you out and the 2nd step is stealing copies of your data and threatening to release all of this information, including […]