Trick 2-Exploiting Unpatched Software
Hackers take advantage of security vulnerabilities in outdated software to install ransomware.
How it Works:
- Many organizations fail to update their software or operating systems, leaving them vulnerable.
- Hackers use automated scanning tools to find and exploit unpatched security flaws.
- Once they gain access, they inject ransomware, encrypting system files.
- The ransomware spreads laterally across the network, affecting multiple systems.
- Critical infrastructure like banks and government agencies are common targets.
Ransomware Attack on Polycab India (2024)

Details:
- Hackers gained unauthorized access to Polycab’s IT infrastructure via compromised RDP credentials.
- They deployed ransomware that encrypted sensitive financial and operational data.
- The attack disrupted manufacturing and supply chain operations, leading to financial losses.
- The breach highlighted how weak RDP security measures can lead to severe cyber threats.