{"version":"1.0","provider_name":"IKARUS Security","provider_url":"https:\/\/www.ikarussecurity.com\/en\/","author_name":"IKARUS","title":"Ransomware attacks: Do\u2018s and Don\u2019ts - IKARUS Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VOJEKRS716\"><a href=\"https:\/\/www.ikarussecurity.com\/en\/resources\/ransomware-attacks-dos-and-donts\/\">Ransomware attacks: Do\u2018s and Don\u2019ts<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ikarussecurity.com\/en\/resources\/ransomware-attacks-dos-and-donts\/embed\/#?secret=VOJEKRS716\" width=\"600\" height=\"338\" title=\"&#8220;Ransomware attacks: Do\u2018s and Don\u2019ts&#8221; &#8212; IKARUS Security\" data-secret=\"VOJEKRS716\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ikarussecurity.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2021\/12\/ransomware-600.jpg","thumbnail_width":600,"thumbnail_height":338,"description":"PDF download Anyone who suddenly finds themselves facing locked devices and encrypted data should be aware: The attackers have most likely not just penetrated your network to plant their ransomware. Expect that they have already been looking around your systems for some time and may have taken a lot of sensitive data beforehand."}