{"id":3941,"date":"2025-07-16T11:15:35","date_gmt":"2025-07-16T09:15:35","guid":{"rendered":"https:\/\/enthec.com\/?p=3941"},"modified":"2025-07-17T07:32:13","modified_gmt":"2025-07-17T05:32:13","slug":"ransomhub-and-the-new-reputational-threat","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/","title":{"rendered":"Ransomhub and the new reputational threat"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We live in a time when cyberattacks no longer only seek to steal information or collapse systems, but also<\/span> <b>directly damage the reputation of organizations.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One of the most recent and worrying examples is<\/span> <b>Ransomhub.<\/b> <span style=\"font-weight: 400;\">This group is reinventing the way ransomware groups operate, with a strategy that combines blackmail, public extortion, and fear marketing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before delving into detail, it&#8217;s worth briefly discussing Kartos, Enthec&#8217;s solution for businesses seeking to stay ahead of emerging threats. Kartos isn&#8217;t an antivirus or a simple perimeter shield. It&#8217;s a Continuous Threat Exposure Management (CTEM) platform designed to help organizations   <\/span><a href=\"https:\/\/enthec.com\/en\/real-time-vulnerability-management-a-step-forward-in-cybersecurity\/\"><span style=\"font-weight: 400;\">detect vulnerabilities<\/span><\/a>, <span style=\"font-weight: 400;\">track external threats, and make informed decisions before damage is real.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the current context, with threats like Ransomhub,<\/span> <b>solutions like Kartos are no longer just an \u201cextra\u201d but an essential asset.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is Ransomhub?<\/b><\/h2>\n<p><b>Ransomhub is a cybercriminal group specializing in ransomware attacks,<\/b> <span style=\"font-weight: 400;\">a <\/span><a href=\"https:\/\/enthec.com\/en\/types-of-malware-and-keys-to-prevent-these-attacks-from-affecting-the-security-of-your-company\/\"><span style=\"font-weight: 400;\">type of malware<\/span><\/a><span style=\"font-weight: 400;\"> that blocks access to systems or encrypts a company&#8217;s data until a ransom is paid. What sets Ransomhub apart from other similar groups isn&#8217;t so much its technology, but its strategic approach: its accurate weapon is the victim&#8217;s reputation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike other cybercriminals, who encrypt data and wait for payment, Ransomhub has taken the concept of ransomware to a more psychological and media-driven level.<\/span><\/p>\n<p><b>They publish confidential information,<\/b> <span style=\"font-weight: 400;\">they make public statements, use social networks and specialized forums to publicly humiliate victims and exert pressure not only technically, but socially.<\/span><\/p>\n<h3><b>A \u201cbrand\u201d of fear<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ransomhub isn&#8217;t hiding anything. It even has a kind of &#8220;portal&#8221; where they announce new victims, much like a corporate blog. The aesthetic, language, and strategy seem straight out of a marketing campaign: they create narratives, document attacks, and aim for virality.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Its objective is clear:<\/span> <b>turn every attack into an example,<\/b><span style=\"font-weight: 400;\">a warning to other companies. If an organization fails to pay, it not only loses its data but also has its name appear on a public list, alongside leaked files, internal documents, and even private communications. <\/span><\/p>\n<p><b>The damage is not only economic, it is also reputational and, in some cases, irreversible.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-3938 aligncenter\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-1.jpg\" alt=\"Ransomhub\" width=\"512\" height=\"341\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-1.jpg 512w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-1-300x200.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-1-350x233.jpg 350w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/p>\n<h2><b>Ransomhub malware: how it works and why it&#8217;s a concern<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The RansomHub malware combines classic ransomware elements with new infiltration and manipulation techniques. <\/span><b>It usually accesses systems by exploiting known vulnerabilities,<\/b><span style=\"font-weight: 400;\">often through leaked credentials on the dark web or through social engineering. Once inside, the malware  <\/span><a href=\"https:\/\/enthec.com\/en\/what-is-data-encryption-features-and-how-does-it-work\/\"><span style=\"font-weight: 400;\">encrypts the data<\/span><\/a> <span style=\"font-weight: 400;\">and sends a clear message: either you pay, or everything becomes public.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But, as we said before, what really distinguishes Ransomhub is<\/span> <b>how it exposes its victims<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Publication of confidential documents<\/b> <span style=\"font-weight: 400;\">on publicly accessible portals.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Leveraging social networks and forums<\/b> <span style=\"font-weight: 400;\">to amplify the damage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Indirect pressure<\/b> <span style=\"font-weight: 400;\">through contact with customers, suppliers, or the media.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This approach has put many organizations on alert<\/span>; t<b>he damage to the image can be even more costly than the rescue itself, <\/b><span style=\"font-weight: 400;\">but giving in to Ransomhub&#8217;s pressure can be just as dangerous.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Are we prepared for this type of threat?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The question is not whether a group like Ransomhub can target a company, but <\/span><b>when. <\/b><span style=\"font-weight: 400;\">. Today&#8217;s hyperconnectivity and the use of multiple digital tools mean that any organization&#8217;s exposure surface is constantly growing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That&#8217;s why it&#8217;s essential to adopt cybersecurity strategies that go beyond reactive measures. This is where the CTEM (Continuous Threat Exposure Management) model comes into play, proposing a  <\/span><b>proactive and continuous approach to identify and mitigate risks before they escalate into real attacks.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How Kartos can help you against threats like Ransomhub<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Kartos, Enthec&#8217;s business solution, is designed specifically for this type of context. Its primary function is to offer  <\/span><b>an external, real-time view of an organization&#8217;s cyber exposure status<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This translates into very concrete benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Early detection<\/b> <span style=\"font-weight: 400;\">of<\/span> <a href=\"https:\/\/enthec.com\/en\/?p=3017\"><span style=\"font-weight: 400;\">leaked credentials<\/span><\/a><span style=\"font-weight: 400;\">, possible access points, or spoofed domains.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat monitoring<\/b><span style=\"font-weight: 400;\"> on the dark web and on channels commonly used by groups like Ransomhub.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Automated alerts<\/b> <span style=\"font-weight: 400;\">in the event of suspicious activities or information leaks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Clear and easy-to-interpret panels<\/b>, <span style=\"font-weight: 400;\">designed to facilitate decision-making by the security team.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The goal is not to eliminate risk (something impossible), but to<\/span> <b>minimize exposure and react quickly and strategically to any warning signs.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Why is reputation now the main target?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Companies have invested in firewalls, antivirus software, and internal training, but <\/span><b>many still neglect their external digital image. <\/b><span style=\"font-weight: 400;\">. Today, a poorly managed incident can become more visible and damaging than the technical attack itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Groups like Ransomhub have understood this perfectly. They are no longer just looking to make money, but to generate fear. Their power lies in their ability to   <\/span><b> hurt where it hurts most: the trust that customers and partners have in the company<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What you can do now to protect yourself<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Beyond technical solutions, there are several key actions every organization should consider to reduce the impact of these types of threats:<\/span><\/p>\n<h3><b>Review and minimize exposure<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Conduct regular audits of systems, users, and access points to ensure security and compliance. Review the publicly visible information and identify what an attacker could exploit for infiltration or extortion. <\/span><\/p>\n<h3><b>Implement constant external monitoring<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Using<\/span> <a href=\"https:\/\/enthec.com\/en\/cybersecurity-solutions-that-you-should-apply-in-your-company\/\"><span style=\"font-weight: 400;\">cybersecurity solutions<\/span><\/a>, <span style=\"font-weight: 400;\">such as<\/span> <b>Kartos<\/b><span style=\"font-weight: 400;\"> enables organizations to stay informed about the outside world. This allows them to monitor what is being said about their company on the dark web, detect leaks early, and take action before they become public headlines. <\/span><\/p>\n<h3><b>Prepare a reputational response plan<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In addition to the technical plan, it is essential to have a<\/span> <b>crisis communication strategy:<\/b><span style=\"font-weight: 400;\">. What is said? How is it said? Who is responsible to the media, clients, or partners? The speed and consistency of the message can make all the difference.   <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Ransomhub is not just malware; it&#8217;s a message<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When you ask yourself what Ransomhub is, the answer goes beyond malware. It&#8217;s a  <\/span><b>new form of extortion, more sophisticated, more public, more dangerous,<\/b><span style=\"font-weight: 400;\">. and, above all, it&#8217;s harder to manage if you&#8217;re not prepared.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s not enough to protect yourself from the inside. Today, it&#8217;s essential to  <\/span><b>stay aware of what happens outside the company,<\/b><span style=\"font-weight: 400;\">. to consider how an attacker might perceive you, to understand their potential actions if they were to harm you, and to anticipate potential threats. In this sense, Kartos isn&#8217;t just a security tool. It&#8217;s a window to the other side of the mirror.    <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Want to know what attackers know about your business?<\/span> <a href=\"https:\/\/enthec.com\/en\/contact\/\"><span style=\"font-weight: 400;\">Contact us<\/span> <\/a><span style=\"font-weight: 400;\">and see how you can anticipate threats like Ransomhub before it&#8217;s too late.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We live in a time when cyberattacks no longer only seek to steal information or collapse systems, but also directly [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3937,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[33,24,32],"class_list":["post-3941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-risks","tag-cybersecurity","tag-kartos-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Ransomhub: Reputation as a Hostage | Enthec<\/title>\n<meta name=\"description\" content=\"Do you know what Ransomhub is? \u26a0\ufe0f A malware that holds your image hostage \u261d Learn to anticipate and avoid irreversible damage\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Ransomhub: Reputation as a Hostage | Enthec\" \/>\n<meta property=\"og:description\" content=\"Do you know what Ransomhub is? \u26a0\ufe0f A malware that holds your image hostage \u261d Learn to anticipate and avoid irreversible damage\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T09:15:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-17T05:32:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Ransomhub and the new reputational threat\",\"datePublished\":\"2025-07-16T09:15:35+00:00\",\"dateModified\":\"2025-07-17T05:32:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\"},\"wordCount\":1086,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg\",\"keywords\":[\"Risks\",\"Cybersecurity\",\"Kartos\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\",\"url\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\",\"name\":\"\u25b7 Ransomhub: Reputation as a Hostage | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg\",\"datePublished\":\"2025-07-16T09:15:35+00:00\",\"dateModified\":\"2025-07-17T05:32:13+00:00\",\"description\":\"Do you know what Ransomhub is? \u26a0\ufe0f A malware that holds your image hostage \u261d Learn to anticipate and avoid irreversible damage\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg\",\"width\":2560,\"height\":1920,\"caption\":\"Qu\u00e9 es Ransomhub\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomhub and the new reputational threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Ransomhub: Reputation as a Hostage | Enthec","description":"Do you know what Ransomhub is? \u26a0\ufe0f A malware that holds your image hostage \u261d Learn to anticipate and avoid irreversible damage","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Ransomhub: Reputation as a Hostage | Enthec","og_description":"Do you know what Ransomhub is? \u26a0\ufe0f A malware that holds your image hostage \u261d Learn to anticipate and avoid irreversible damage","og_url":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-07-16T09:15:35+00:00","article_modified_time":"2025-07-17T05:32:13+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Ransomhub and the new reputational threat","datePublished":"2025-07-16T09:15:35+00:00","dateModified":"2025-07-17T05:32:13+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/"},"wordCount":1086,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg","keywords":["Risks","Cybersecurity","Kartos"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/","url":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/","name":"\u25b7 Ransomhub: Reputation as a Hostage | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg","datePublished":"2025-07-16T09:15:35+00:00","dateModified":"2025-07-17T05:32:13+00:00","description":"Do you know what Ransomhub is? \u26a0\ufe0f A malware that holds your image hostage \u261d Learn to anticipate and avoid irreversible damage","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/07\/ransomhub-que-es-scaled.jpg","width":2560,"height":1920,"caption":"Qu\u00e9 es Ransomhub"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/ransomhub-and-the-new-reputational-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/"},{"@type":"ListItem","position":2,"name":"Ransomhub and the new reputational threat"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=3941"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/3941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/3937"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=3941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=3941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=3941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}