The hackers used Kaspersky Lab anti-virus software to locate the files, according to a recent report.
Among those that paid the ransom, 15 percent still never recovered their data, a recent survey found.
The group has been targeting companies with aviation-related connections to Saudi Arabia.
The hacker or hackers appear to have gained admin level access for several months before they were detected.
And 21 percent have fallen victim to phishing attacks, a recent survey found.
And another 32 percent haven't yet decided whether they will or not, a recent survey found.
There are a lot of different pitfalls when it comes to IoT security that developers need to avoid.
The exploit, which requires no user interaction, can give the attacker control of the affected device.
In many cases, companies that paid the ransom were scammed -- the data had simply been wiped.
The simple lesson in this case is to not pre-install software that violates user privacy.
The exposed information also includes names, birthdates and addresses, as well as some driver's license numbers, credit card numbers and other data.
The Dragonfly group now appears to be focused on compromising operational networks.
Widely used Java framework is once again updating for some highly impactful issues.
The campaign is just one of many currently distributing Locky ransomware.
Widely used ecommerce module had a flaw that could have been used as a stepping stone to a larger attack.
Next to reliable data backups, a good cyber insurance policy may be your best protection against the damage wrought by ransomware attacks.
For the second time in as many months, a software developer's website was compromised and used to distribute malware.
The NIAC says there's a 'narrow and fleeting window of opportunity' to organize effectively and prevent such attacks.