CINXE.COM
Randsomcloud: The Next Frontier in Cybersecurity Threats | Cybersecurity Association of Maryland
<!DOCTYPE html><html lang="en" dir="ltr" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# schema: http://schema.org/ sioc: http://rdfs.org/sioc/ns# sioct: http://rdfs.org/sioc/types# skos: http://www.w3.org/2004/02/skos/core# xsd: http://www.w3.org/2001/XMLSchema# "><head><meta charset="utf-8" /><script async src="https://www.googletagmanager.com/gtag/js?id=G-QVDXLZS8SB"></script><script>window.dataLayer = window.dataLayer || [];function gtag(){dataLayer.push(arguments)};gtag("js", new Date());gtag("set", "developer_id.dMDhkMT", true);gtag("config", "G-QVDXLZS8SB", {"groups":"default","page_placeholder":"PLACEHOLDER_page_location","allow_ad_personalization_signals":false});</script><link rel="canonical" href="https://www.mdcyber.com/news/randsomcloud-next-frontier-cybersecurity-threats" /><meta name="description" content="In the rapidly evolving landscape of cyber security, a new kind of threat has emerged that targets cloud services and poses a significant risk to businesses of all sizes: ransomcloud. This sophisticated form of ransomware aims to encrypt data stored in the cloud, demanding a ransom for its release. As more organizations migrate their operations to the cloud, understanding and mitigating the risks associated with ransomcloud attacks becomes crucial. Let’s explore what ransomcloud is, how it works and what businesses can do to protect themselves." /><meta name="Generator" content="Drupal 9 (https://www.drupal.org)" /><meta name="MobileOptimized" content="width" /><meta name="HandheldFriendly" content="true" /><meta name="viewport" content="width=device-width, initial-scale=1.0" /><link rel="stylesheet" href="https://www.mdcyber.com/sites/default/files/fontyourface/local_fonts/montserrat/font.css" media="all" /><link rel="stylesheet" href="https://www.mdcyber.com/sites/default/files/fontyourface/local_fonts/eventbank_v1_2/font.css" media="all" /><link rel="stylesheet" href="https://www.mdcyber.com/sites/default/files/fontyourface/local_fonts/eventbank_v1_21/font.css" media="all" /><link rel="stylesheet" href="https://www.mdcyber.com/sites/default/files/fontyourface/local_fonts/eventbank_v1_22/font.css" media="all" /><link rel="stylesheet" href="https://www.mdcyber.com/sites/default/files/fontyourface/local_fonts/eventbank_v1_23/font.css" media="all" /><link rel="stylesheet" href="https://www.mdcyber.com/sites/default/files/fontyourface/local_fonts/eventbank_v1_24/font.css" media="all" /><link rel="icon" href="/sites/default/files/CA_favicon-min.png" type="image/png" /><title>Randsomcloud: The Next Frontier in Cybersecurity Threats | Cybersecurity Association of Maryland</title><link rel="stylesheet" media="all" href="/sites/default/files/css/css_F1jnAHGjRqjduUwcgWRLU5pgmRIrxr8_3pZ6oGU1DdI.css" /><link rel="stylesheet" media="all" href="/sites/default/files/css/css_8B-ZM7RAK_IJuM8aDmEPCve4ivkLWDDsmHZZv7hVEcc.css" /><link rel="stylesheet" media="all" href="/sites/default/files/css/css_sdeOH3K8Yud5IiENbQY86gyRFqr_2VR7ONs7ZGCQytY.css" /><link rel="stylesheet" media="all" href="/sites/default/files/css/css_Ka4br3nm7B0sO6oEfGW6yiRGtaXW8-zF_DnQ5e9i_f8.css" /><link rel="stylesheet" media="all" href="//cdn.jsdelivr.net/npm/bootstrap@3.4.1/dist/css/bootstrap.min.css" integrity="sha256-bZLfwXAP04zRMK2BjiO8iu9pf4FbLqX6zitd+tIvLhE=" crossorigin="anonymous" /><link rel="stylesheet" media="all" href="//cdn.jsdelivr.net/npm/@unicorn-fail/drupal-bootstrap-styles@0.0.2/dist/3.4.0/8.x-3.x/drupal-bootstrap.min.css" integrity="sha512-tGFFYdzcicBwsd5EPO92iUIytu9UkQR3tLMbORL9sfi/WswiHkA1O3ri9yHW+5dXk18Rd+pluMeDBrPKSwNCvw==" crossorigin="anonymous" /><link rel="stylesheet" media="all" href="/sites/default/files/css/css_z1IsHwMLDAwTsuEvxeIytbDRbX9wF9DXO4LZx1wwY4M.css" /></head><body class="fontyourface page-node-503 body-class path-node page-node-type-news has-glyphicons context-news-randsomcloud-next-frontier-cybersecurity-threats route-entity-node-canonical"><div class="ajax-overlay"><div id="loading"></div></div> <a href="#main-content" class="visually-hidden focusable skip-link"> Skip to main content </a><div class="dialog-off-canvas-main-canvas" data-off-canvas-main-canvas> <header class="navbar navbar-default container" id="navbar" role="banner"><div class="navbar-header"><div class="region region-navigation class-region-news-randsomcloud-next-frontier-cybersecurity-threats region-entity-node-canonical"> <section id="block-headerleft" class="col-xs-3 mobile-hide group-header-left block block-blockgroup block-block-groupheader-left clearfix"> <a class="logo navbar-btn pull-left" href="/" title="Home" rel="home"> <img src="/sites/default/files/CA_Logo-min.png" alt="Home" /> </a> </section><section id="block-headerright" class="col-xs-9 mobile-hide group-header-right block block-blockgroup block-block-groupheader-right clearfix"> <section id="block-headerrighttop" class="col-xs-12 group-header-right-top block block-blockgroup block-block-groupheader-right-top clearfix"><div class="search-block-form col-xs-5 search-block-header block block-search block-search-form-block" data-drupal-selector="search-block-form" id="block-searchform" role="search"><form action="/search/node" method="get" id="search-block-form" accept-charset="UTF-8"><div class="form-item js-form-item form-type-search js-form-type-search form-item-keys js-form-item-keys form-no-label form-group"> <label for="edit-keys--3" class="control-label sr-only">Search</label><div class="input-group"><input title="" data-toggle="" data-original-title="" data-drupal-selector="edit-keys" class="form-search form-control" placeholder="Search" type="search" id="edit-keys--3" name="keys" value="" size="15" maxlength="128" /><span class="input-group-btn"><button type="submit" value="Search" class="button js-form-submit form-submit btn-primary btn icon-only" name=""><span class="sr-only">Search</span><span class="icon glyphicon glyphicon-search" aria-hidden="true"></span></button></span></div><div id="edit-keys--3--description" class="description help-block"> Enter the terms you wish to search for.</div></div><div class="form-actions form-group js-form-wrapper form-wrapper" data-drupal-selector="edit-actions" id="edit-actions"></div></form></div><section id="block-socialfollow" class="col-xs-3 header-login-register-follow header-social-follow block block-eventbank-social block-social-follow-block clearfix"><div class="icon-social-header"><div class="social-header-follow button-social-media"> <a href="https://twitter.com/CAMIcyberMD" target="_blank"> <span class="f-icon twitter-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://www.facebook.com/buymdcyber" target="_blank"> <span class="f-icon facebook-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://www.linkedin.com/company/buy-md-cyber-operated-by-the-cybersecurity-association-of-maryland-inc/?viewAsMember=true" target="_blank"> <span class="f-icon linkedin-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://www.instagram.com/camicybermd/" target="_blank"> <span class="f-icon instagram-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://youtube.com/@CyberAssociation?si=waMUkOuxM4xDcYmX" target="_blank"> <span class="f-icon youtube-icon icon-social-media"></span> </a></div></div> </section><section id="block-eventbankregister" class="col-xs-2 header-login-register-follow header-eventbank-register block block-eventbank-api block-eventbank-register-block clearfix"> <a target="_blank" href="https://mdcyber.glueup.com/register/account"><div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Register</p></div> </a> </section><section id="block-eventbanklogin" class="col-xs-2 header-login-register-follow header-eventbank-login block block-eventbank-api block-eventbank-login-block clearfix"> <a class="popup-modal user-login-button" href="/user/login#region-content"><div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Login</p></div> </a> </section> </section><section id="block-mainnavigation" class="col-xs-12 main-navigation block block-superfish block-superfishmain clearfix"><ul id="superfish-main" class="menu sf-menu sf-main sf-navbar sf-style-white"><li id="main-menu-link-content289c190f-02a6-4931-a117-68244663329e" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">About</span><ul><li id="main-menu-link-content0fe7909c-a9b7-43c9-8d1c-a420505a18e6" class="sf-depth-2 sf-no-children"><a href="/about" class="sf-depth-2">Our History</a></li><li id="main-menu-link-content2e0e5c38-bc0d-42f6-845c-058630a4b429" class="sf-depth-2 sf-no-children"><a href="/board-directors" class="sf-depth-2">Board of Directors</a></li><li id="main-menu-link-content19da935b-79b2-49d1-a2c8-f03306317b25" class="sf-depth-2 sf-no-children"><a href="/partners" class="sf-depth-2">Partners</a></li></ul></li><li id="main-menu-link-content1f95291f-33c3-42c4-9e89-47f7d863cbc8" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Events & Programs</span><ul><li id="main-menu-link-content3c1e3653-37be-4901-9499-720f82266f1c" class="sf-depth-2 sf-no-children"><a href="/events" class="sf-depth-2">Events</a></li><li id="main-menu-link-content39edba0c-b628-4b59-bf61-bbf424379777" class="sf-depth-2 sf-no-children"><a href="/sponsor" class="sf-depth-2">Sponsor</a></li><li id="main-menu-link-contentc0ccc36a-23c4-4ac4-b171-8f2c7fd72f1a" class="sf-depth-2 sf-no-children"><a href="/community-event" class="sf-depth-2">Community Events</a></li><li id="main-menu-link-content928f8a23-67ed-4640-9521-e2ed2e43e16d" class="sf-depth-2 sf-no-children"><a href="/cybersecurity-awards" class="sf-depth-2">Cybersecurity Awards</a></li></ul></li><li id="main-menu-link-content5d2f0f27-992e-4944-b1b5-a47d234b4db5" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Membership</span><ul><li id="main-menu-link-content35d5e0d9-fea1-433d-a8b4-f14a7fe7d7dc" class="sf-depth-2 sf-no-children"><a href="/become-member" class="sf-depth-2">Become a Member</a></li><li id="main-menu-link-contentea5f50f9-04d8-4f5d-bdda-b2b65aa73fbd" class="sf-depth-2 sf-no-children"><a href="/member-benefits" class="sf-depth-2">Member Benefits</a></li><li id="main-menu-link-contentafb594b3-8c8e-4f70-92f9-454da302c19a" class="sf-depth-2 sf-no-children"><a href="/cyber-committees" class="sf-depth-2">Cyber Communities</a></li><li id="main-menu-link-contente45b991a-0ce3-49c6-8bea-6f7d66d35070" class="sf-depth-2 sf-no-children"><a href="/membership-directory/corporate" class="sf-depth-2">Member Search</a></li></ul></li><li id="main-menu-link-content9144f3d1-230d-464a-bbd7-4ec109b1ef70" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Resources</span><ul><li id="main-menu-link-content4d09679b-05a2-4633-8344-8eb59e58182e" class="sf-depth-2 sf-no-children"><a href="/centers-excellence" class="sf-depth-2">Centers of Excellence</a></li><li id="main-menu-link-content1366ac9d-bb19-4d97-b4dd-d793bc69f28a" class="sf-depth-2 sf-no-children"><a href="/request-speaker" class="sf-depth-2">Request a Speaker</a></li><li id="main-menu-link-contentcd17e3b2-c75f-41de-a054-e7c7736f0e55" class="sf-depth-2 sf-no-children"><a href="/news" class="sf-depth-2">News</a></li></ul></li><li id="main-menu-link-contenta0013c7e-10ac-4d90-ba51-06f811799bac" class="sf-depth-1 sf-no-children"><a href="/contact" class="sf-depth-1">Contact Us</a></li></ul> </section> </section><section id="block-mobileheadertop" class="col-xs-12 mobile-display mobile-header-top block block-blockgroup block-block-groupmobile-header-top clearfix"> <section id="block-socialfollow-2" class="col-xs-6 header-login-register-follow-mobile social-follow-mobile block block-eventbank-social block-social-follow-block clearfix"><div class="icon-social-header"><div class="social-header-follow button-social-media"> <a href="https://twitter.com/CAMIcyberMD" target="_blank"> <span class="f-icon twitter-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://www.facebook.com/buymdcyber" target="_blank"> <span class="f-icon facebook-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://www.linkedin.com/company/buy-md-cyber-operated-by-the-cybersecurity-association-of-maryland-inc/?viewAsMember=true" target="_blank"> <span class="f-icon linkedin-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://www.instagram.com/camicybermd/" target="_blank"> <span class="f-icon instagram-icon icon-social-media"></span> </a></div><div class="social-header-follow button-social-media"> <a href="https://youtube.com/@CyberAssociation?si=waMUkOuxM4xDcYmX" target="_blank"> <span class="f-icon youtube-icon icon-social-media"></span> </a></div></div> </section><section id="block-eventbanklogin-2" class="col-xs-3 header-login-register-follow-mobile eventbank-login-mobile block block-eventbank-api block-eventbank-login-block clearfix"> <a class="popup-modal user-login-button" href="/user/login#region-content"><div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Login</p></div> </a> </section><section id="block-eventbankregister-2" class="col-xs-3 header-login-register-follow-mobile eventbank-register-mobile block block-eventbank-api block-eventbank-register-block clearfix"> <a target="_blank" href="https://mdcyber.glueup.com/register/account"><div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p> Register</p></div> </a> </section> </section><section id="block-mobileheaderbottom" class="col-xs-12 mobile-display mobile-header-bottom block block-blockgroup block-block-groupmobile-header-bottom clearfix"> <a class="logo navbar-btn pull-left" href="/" title="Home" rel="home"> <img src="/sites/default/files/CA_Logo-min.png" alt="Home" /> </a> <section id="block-mobilemenu" class="col-xs-6 block block-eventbank-api block-mobile-menu clearfix"><div class="mobile-header-menu"> <span class="mobile-header-menu-link f-icon mobile-menu-icon"></span><div class="mobile-block-menu"> <span class="f-icon close-icon"></span> <section id="block-mainnavigation-2" class="main-navigation-mobile block block-superfish block-superfishmain clearfix"><ul id="superfish-main--2" class="menu sf-menu sf-main sf-vertical sf-style-none"><li id="main-menu-link-content289c190f-02a6-4931-a117-68244663329e--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">About</span><ul><li id="main-menu-link-content0fe7909c-a9b7-43c9-8d1c-a420505a18e6--2" class="sf-depth-2 sf-no-children"><a href="/about" class="sf-depth-2">Our History</a></li><li id="main-menu-link-content2e0e5c38-bc0d-42f6-845c-058630a4b429--2" class="sf-depth-2 sf-no-children"><a href="/board-directors" class="sf-depth-2">Board of Directors</a></li><li id="main-menu-link-content19da935b-79b2-49d1-a2c8-f03306317b25--2" class="sf-depth-2 sf-no-children"><a href="/partners" class="sf-depth-2">Partners</a></li></ul></li><li id="main-menu-link-content1f95291f-33c3-42c4-9e89-47f7d863cbc8--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Events & Programs</span><ul><li id="main-menu-link-content3c1e3653-37be-4901-9499-720f82266f1c--2" class="sf-depth-2 sf-no-children"><a href="/events" class="sf-depth-2">Events</a></li><li id="main-menu-link-content39edba0c-b628-4b59-bf61-bbf424379777--2" class="sf-depth-2 sf-no-children"><a href="/sponsor" class="sf-depth-2">Sponsor</a></li><li id="main-menu-link-contentc0ccc36a-23c4-4ac4-b171-8f2c7fd72f1a--2" class="sf-depth-2 sf-no-children"><a href="/community-event" class="sf-depth-2">Community Events</a></li><li id="main-menu-link-content928f8a23-67ed-4640-9521-e2ed2e43e16d--2" class="sf-depth-2 sf-no-children"><a href="/cybersecurity-awards" class="sf-depth-2">Cybersecurity Awards</a></li></ul></li><li id="main-menu-link-content5d2f0f27-992e-4944-b1b5-a47d234b4db5--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Membership</span><ul><li id="main-menu-link-content35d5e0d9-fea1-433d-a8b4-f14a7fe7d7dc--2" class="sf-depth-2 sf-no-children"><a href="/become-member" class="sf-depth-2">Become a Member</a></li><li id="main-menu-link-contentea5f50f9-04d8-4f5d-bdda-b2b65aa73fbd--2" class="sf-depth-2 sf-no-children"><a href="/member-benefits" class="sf-depth-2">Member Benefits</a></li><li id="main-menu-link-contentafb594b3-8c8e-4f70-92f9-454da302c19a--2" class="sf-depth-2 sf-no-children"><a href="/cyber-committees" class="sf-depth-2">Cyber Communities</a></li><li id="main-menu-link-contente45b991a-0ce3-49c6-8bea-6f7d66d35070--2" class="sf-depth-2 sf-no-children"><a href="/membership-directory/corporate" class="sf-depth-2">Member Search</a></li></ul></li><li id="main-menu-link-content9144f3d1-230d-464a-bbd7-4ec109b1ef70--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Resources</span><ul><li id="main-menu-link-content4d09679b-05a2-4633-8344-8eb59e58182e--2" class="sf-depth-2 sf-no-children"><a href="/centers-excellence" class="sf-depth-2">Centers of Excellence</a></li><li id="main-menu-link-content1366ac9d-bb19-4d97-b4dd-d793bc69f28a--2" class="sf-depth-2 sf-no-children"><a href="/request-speaker" class="sf-depth-2">Request a Speaker</a></li><li id="main-menu-link-contentcd17e3b2-c75f-41de-a054-e7c7736f0e55--2" class="sf-depth-2 sf-no-children"><a href="/news" class="sf-depth-2">News</a></li></ul></li><li id="main-menu-link-contenta0013c7e-10ac-4d90-ba51-06f811799bac--2" class="sf-depth-1 sf-no-children"><a href="/contact" class="sf-depth-1">Contact Us</a></li></ul> </section><div class="social-block-menu-container"><div class="social-block-menu"><div class="social-menu-follow button-social-media"> <a href="https://twitter.com/CAMIcyberMD" target="_blank"> <span class="f-icon twitter-icon icon-social-media"></span> </a></div><div class="social-menu-follow button-social-media"> <a href="https://www.facebook.com/buymdcyber" target="_blank"> <span class="f-icon facebook-icon icon-social-media"></span> </a></div><div class="social-menu-follow button-social-media"> <a href="https://www.linkedin.com/company/buy-md-cyber-operated-by-the-cybersecurity-association-of-maryland-inc/?viewAsMember=true" target="_blank"> <span class="f-icon linkedin-icon icon-social-media"></span> </a></div><div class="social-menu-follow button-social-media"> <a href="https://www.instagram.com/camicybermd/" target="_blank"> <span class="f-icon instagram-icon icon-social-media"></span> </a></div><div class="social-menu-follow button-social-media"> <a href="https://youtube.com/@CyberAssociation?si=waMUkOuxM4xDcYmX" target="_blank"> <span class="f-icon youtube-icon icon-social-media"></span> </a></div></div></div></div></div> </section><section id="block-mainnavigation-2" class="main-navigation-mobile block block-superfish block-superfishmain clearfix"><ul id="superfish-main--2" class="menu sf-menu sf-main sf-vertical sf-style-none"><li id="main-menu-link-content289c190f-02a6-4931-a117-68244663329e--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">About</span><ul><li id="main-menu-link-content0fe7909c-a9b7-43c9-8d1c-a420505a18e6--2" class="sf-depth-2 sf-no-children"><a href="/about" class="sf-depth-2">Our History</a></li><li id="main-menu-link-content2e0e5c38-bc0d-42f6-845c-058630a4b429--2" class="sf-depth-2 sf-no-children"><a href="/board-directors" class="sf-depth-2">Board of Directors</a></li><li id="main-menu-link-content19da935b-79b2-49d1-a2c8-f03306317b25--2" class="sf-depth-2 sf-no-children"><a href="/partners" class="sf-depth-2">Partners</a></li></ul></li><li id="main-menu-link-content1f95291f-33c3-42c4-9e89-47f7d863cbc8--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Events & Programs</span><ul><li id="main-menu-link-content3c1e3653-37be-4901-9499-720f82266f1c--2" class="sf-depth-2 sf-no-children"><a href="/events" class="sf-depth-2">Events</a></li><li id="main-menu-link-content39edba0c-b628-4b59-bf61-bbf424379777--2" class="sf-depth-2 sf-no-children"><a href="/sponsor" class="sf-depth-2">Sponsor</a></li><li id="main-menu-link-contentc0ccc36a-23c4-4ac4-b171-8f2c7fd72f1a--2" class="sf-depth-2 sf-no-children"><a href="/community-event" class="sf-depth-2">Community Events</a></li><li id="main-menu-link-content928f8a23-67ed-4640-9521-e2ed2e43e16d--2" class="sf-depth-2 sf-no-children"><a href="/cybersecurity-awards" class="sf-depth-2">Cybersecurity Awards</a></li></ul></li><li id="main-menu-link-content5d2f0f27-992e-4944-b1b5-a47d234b4db5--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Membership</span><ul><li id="main-menu-link-content35d5e0d9-fea1-433d-a8b4-f14a7fe7d7dc--2" class="sf-depth-2 sf-no-children"><a href="/become-member" class="sf-depth-2">Become a Member</a></li><li id="main-menu-link-contentea5f50f9-04d8-4f5d-bdda-b2b65aa73fbd--2" class="sf-depth-2 sf-no-children"><a href="/member-benefits" class="sf-depth-2">Member Benefits</a></li><li id="main-menu-link-contentafb594b3-8c8e-4f70-92f9-454da302c19a--2" class="sf-depth-2 sf-no-children"><a href="/cyber-committees" class="sf-depth-2">Cyber Communities</a></li><li id="main-menu-link-contente45b991a-0ce3-49c6-8bea-6f7d66d35070--2" class="sf-depth-2 sf-no-children"><a href="/membership-directory/corporate" class="sf-depth-2">Member Search</a></li></ul></li><li id="main-menu-link-content9144f3d1-230d-464a-bbd7-4ec109b1ef70--2" class="sf-depth-1 menuparent"><span class="sf-depth-1 menuparent nolink">Resources</span><ul><li id="main-menu-link-content4d09679b-05a2-4633-8344-8eb59e58182e--2" class="sf-depth-2 sf-no-children"><a href="/centers-excellence" class="sf-depth-2">Centers of Excellence</a></li><li id="main-menu-link-content1366ac9d-bb19-4d97-b4dd-d793bc69f28a--2" class="sf-depth-2 sf-no-children"><a href="/request-speaker" class="sf-depth-2">Request a Speaker</a></li><li id="main-menu-link-contentcd17e3b2-c75f-41de-a054-e7c7736f0e55--2" class="sf-depth-2 sf-no-children"><a href="/news" class="sf-depth-2">News</a></li></ul></li><li id="main-menu-link-contenta0013c7e-10ac-4d90-ba51-06f811799bac--2" class="sf-depth-1 sf-no-children"><a href="/contact" class="sf-depth-1">Contact Us</a></li></ul> </section> </section></div></div> </header><div class="full-top-page"><div role="heading"></div></div><div role="main" class="main-container container js-quickedit-main-content"><div class="row"> <section class="col-sm-9"><div class="highlighted"><div class="region region-highlighted class-region-news-randsomcloud-next-frontier-cybersecurity-threats region-entity-node-canonical"><ol class="breadcrumb"><li > <a href="/">Home</a></li><li > <a href="/news">news</a></li><li > randsomcloud next frontier cybersecurity threats</li></ol><div data-drupal-messages-fallback class="hidden"></div></div></div> <a id="main-content"></a><div class="region region-content class-region-news-randsomcloud-next-frontier-cybersecurity-threats region-entity-node-canonical"> <section id="block-glueupadshorizontaltop" class="block block-glueup-ads block-glueup-ads-horizontal-top-block clearfix"><div class="glueup-ads-slick-list"></div> </section><section id="block-glueupadsverticaltop-2" class="block block-glueup-ads block-glueup-ads-vertical-top-block clearfix"><div class="glueup-ads-slick-list"><div class="slick blazy slick--optionset--default" data-blazy="" id="slick-1"><div id="slick-1-slider" data-slick="{"autoplay":true,"arrows":false}" class="slick__slider"><div class="slick__slide slide slide--0"><div class="slide__content"> <a target="_blank" href="https://www.mdcyber.com/sponsor"><img src="https://www.mdcyber.com/sites/default/files/2024-06/Screenshot%202024-06-26%20at%203.20.10%E2%80%AFPM_0.png" width="200" height="292" alt="" typeof="Image" class="img-responsive"></a><div class="slide__caption"><h2 class="slide__title"></h2></div></div></div><div class="slick__slide slide slide--1"><div class="slide__content"> <a target="_blank" href="https://www.mdcyber.com/sponsor"><img src="https://www.mdcyber.com/sites/default/files/2024-06/Screenshot%202024-06-26%20at%203.22.45%E2%80%AFPM_0.png" width="200" height="292" alt="" typeof="Image" class="img-responsive"></a><div class="slide__caption"><h2 class="slide__title"></h2></div></div></div></div> <nav role="navigation" class="slick__arrow"> <button type="button" data-role="none" class="slick-prev" aria-label="Previous" tabindex="0">Previous</button> <button type="button" data-role="none" class="slick-next" aria-label="Next" tabindex="0">Next</button> </nav></div></div> </section><h1 class="page-header"><span>Randsomcloud: The Next Frontier in Cybersecurity Threats</span></h1><div data-history-node-id="503" class="node node--type-news node--view-mode-full ds-1col clearfix"><div class="news-top-information"><div class="field field--name-node-post-date field--type-ds field--label-hidden field--item">September 25, 2024</div><div class="field field--name-field-source field--type-link field--label-hidden field--item"><b>Source:</b> <a href="https://www.gma-cpa.com/technology-blog/ransomcloud-the-next-frontier-in-cyber-security-threats">Gross Mendelsohn</a></div></div><div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"><p>In the rapidly evolving landscape of cyber security, a new kind of threat has emerged that targets cloud services and poses a significant risk to businesses of all sizes: ransomcloud.</p><p>This sophisticated form of ransomware aims to encrypt data stored in the cloud, demanding a ransom for its release. As more organizations migrate their operations to the cloud, understanding and mitigating the risks associated with ransomcloud attacks becomes crucial.</p><p>Let’s explore what ransomcloud is, how it works and what businesses can do to protect themselves.</p><h3>What Is Ransomcloud?</h3><p>Ransomcloud is a type of ransomware specifically designed to target cloud-based data and infrastructure. Platforms like Microsoft’s Azure (including Microsoft 365 email), Amazon’s AWS or even Google Cloud (including GSuite email) are the kind of platforms ransomcloud targets.</p><p>Unlike traditional ransomware, which typically infects individual computers or local networks, ransomcloud attacks focus on cloud services where critical business data is stored. This can include email services, file storage, databases and other cloud-based applications.</p><p>The main objective of ransomcloud is to gain access to a user’s cloud account, encrypt the data stored there and then demand a ransom payment, usually in cryptocurrency, for the decryption key. The impact of such an attack can be devastating, leading to data loss, operational disruptions and significant financial costs.</p><p>In most cases, regular non-privileged user accounts that are compromised will have their email and files encrypted. In the event privileged (administrator-level) accounts are compromised, the entire company could be at risk.</p><h3>How Do Ransomcloud Attacks Work?</h3><p>Ransomcloud attacks typically follow a multi-step process:</p><h3>1. Phishing Attacks</h3><p>Ransomcloud often starts with a phishing email designed to trick users into divulging their login credentials for <a href="https://www.gma-cpa.com/technology-blog/hidden-benefits-of-cloud-services">cloud services</a>. These emails can be highly convincing, mimicking legitimate messages from trusted sources. They can be cleverly disguised as a OneNote, SharePoint or a Dropbox file share.</p><p>In some cases, credentials may not be stolen at all, but a link which is disguised as previously mentioned, may point to a web-based application which, when granted access, can have direct unauthenticated access to your account (OAuth).</p><h4>2. Credential Harvesting</h4><p>Once the attacker obtains the login credentials or has been granted an OAuth token, they gain access to the victim’s cloud account. With access to the account, they can manipulate data, change settings and ultimately deploy ransomware to encrypt the stored data.</p><h4>3. Data Encryption</h4><p>The attacker uses ransomware to encrypt the data within the cloud account. This can affect emails, files, databases and any other data stored in the cloud. The victim is then locked out of their data, rendering it inaccessible without the decryption key.</p><h4>4. Ransom Demand</h4><p>After encrypting the data, the attacker <a href="https://www.gma-cpa.com/technology-blog/paying-ransom-on-a-ransomware-attack-is-illegal">demands a ransom payment</a> in exchange for the decryption key. The ransom note is typically delivered via email or displayed as a message within the affected cloud service, just like you may have seen on computer or network attacks.</p><h4>5. Payment and Decryption</h4><p>If the victim pays the ransom, there is no guarantee that the attacker will provide the decryption key. Even if the key is provided, there is a risk of residual malware or repeat attacks.</p><p>In many cases, even if the attacker gives you the decryption key, they may take a copy of your mailbox and sell the data on the dark web.</p><h3>Protecting Your Business from Ransomcloud</h3><p>Given the potential impact of ransomcloud attacks, it is crucial for businesses to take proactive steps to protect their cloud data. Here are some key strategies:</p><h4>1. Implement Strong Authentication</h4><p>Use multi-factor authentication (MFA) for all cloud services to add an extra layer of security. MFA requires users to provide two or more verification factors, making it more difficult for attackers to gain access to accounts. This can stop attackers that are using the “stolen user credential” method.</p><p>Implement the path of least privileged in the cloud. Standard user accounts should not have any kind of administrative access rights; review what standard users have the right to do.</p><p>Did you know that by default, Microsoft allows standard users to create <a href="https://www.buzzsprout.com/2378040/15452039">application registrations and enterprise applications</a>? This means if successfully targeted, their mailbox could be encrypted. Consider disabling standard users’ ability to register or consent to applications on their behalf.</p><h4>2. Educate Employees</h4><p>Conduct regular training sessions to educate employees about phishing attacks and how to recognize suspicious emails. Awareness is a critical defense against phishing and other social engineering attacks.</p><p>Consider sending out an IT newsletter or a tips and tricks email to educate your users. Consider training users on things like the image below. In NO situation should a user click “Accept” on a prompt like this:</p><p><img alt="Permissions requested" height="441" loading="lazy" sizes="(max-width: 378px) 100vw, 378px" src="https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=378&height=441&name=Permissions%20requested.png" srcset="https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=189&height=221&name=Permissions%20requested.png 189w, https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=378&height=441&name=Permissions%20requested.png 378w, https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=567&height=662&name=Permissions%20requested.png 567w, https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=756&height=882&name=Permissions%20requested.png 756w, https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=945&height=1103&name=Permissions%20requested.png 945w, https://www.gma-cpa.com/hs-fs/hubfs/TSG%20Blog%20Photos%20-%202024/Permissions%20requested.png?width=1134&height=1323&name=Permissions%20requested.png 1134w" width="378" /></p><h4>3. Regular Backups</h4><p>Regularly <a href="https://www.buzzsprout.com/2378040/15479894">back up cloud data</a> to ensure that you have a copy of your data that can be restored in the event of an attack.</p><p>By default, cloud-based services do not backup your data automatically. This is commonly something you must explicitly enable and configure. If your provider does not offer a backup solution, dozens of reputable providers can perform this service.</p><p>Make sure that backups are stored in a separate, secure location (like a separate cloud) and are not directly accessible from the cloud environment.</p><h4>4. Use Encryption</h4><p>Encrypt sensitive data before storing it in the cloud. This ensures that even if the data is accessed by an unauthorized party, it remains unreadable without the encryption key, thus, a leak of sensitive data is unlikely.</p><h4>5. Monitor and Audit</h4><p>Implement continuous monitoring and auditing of cloud accounts to detect unusual activity. This can help identify potential security breaches early and allow for swift action to mitigate the risk.</p><h4>6. Develop an Incident Response Plan</h4><p>Create a comprehensive incident response plan that outlines the steps to take in the event of a ransomcloud attack. This should include procedures for isolating or shutting down affected cloud accounts, restoring data from backups and communicating with stakeholders if necessary.</p><h4>7. Engage with Security Experts</h4><p>Consider partnering with cyber security experts or <a href="https://www.gma-cpa.com/technology-blog/top-cyber-security-threats-and-how-managed-services-can-help">managed services providers</a> (MSPs) like Gross Mendelsohn, who specialize in cloud security. They can provide valuable insights, best practices, products and ongoing support to protect your cloud infrastructure.</p><h3>Conclusion</h3><p>Ransomcloud represents a significant threat in the cyber security landscape, targeting the very systems that businesses rely on for their operations. By understanding how ransomcloud attacks work and implementing robust security measures, businesses can significantly reduce their risk and protect their valuable data.</p><p>Proactive steps such as strong authentication, review of permissions and default abilities, employee education, regular backups and restore testing, and continuous monitoring are essential components of a comprehensive cloud security strategy. Stay vigilant, stay informed and take the necessary precautions to safeguard your business against ransomcloud and other emerging cyber threats.</p><h3>Need Help?</h3><p>Our Technology Solutions Group includes a team of cyber security experts. We’re happy to meet with you for a <a href="https://technology.gma-cpa.com/cyber-security-risk-assessment">cyber security risk assessment</a> of your organization’s IT infrastructure. Or, you can contact us <a href="https://technology.gma-cpa.com/consultation">online</a> or call 410.685.5512 with any questions.</p><p> </p><p>By: <a href="https://www.gma-cpa.com/technology-blog/author/joshua-beitler">Joshua Beitler</a></p><p>Published September 25, 2024</p></div></div><section id="block-socialshare" class="block block-eventbank-social block-social-share-block clearfix"><div class="post-share"><div class="post-share-title"> Share this on</div><div class="post-share-container"><script defer> function fbs_click() { u=location.href;t=document.title; window.open( 'http://www.facebook.com/sharer.php?u='+encodeURIComponent(u)+'&t='+encodeURIComponent(t), 'sharer', 'toolbar=0,status=0,width=626,height=436' ); return false; } </script><a class="facebook-share-button button-social-media" href="https://www.facebook.com/share.php?u=https://www.mdcyber.com/news/randsomcloud-next-frontier-cybersecurity-threats" rel="nofollow" onclick="return fbs_click()" target="_blank"> <span class="f-icon facebook-icon icon-social-media"></span> </a> <a target="_blank" class="linkedin-share-button button-social-media" href="https://www.linkedin.com/shareArticle?mini=true&url=https://www.mdcyber.com/news/randsomcloud-next-frontier-cybersecurity-threats"> <span class="f-icon linkedin-icon"></span> </a> <a target="_blank" class="twitter-share-button button-social-media" href="https://twitter.com/intent/tweet?url=https://www.mdcyber.com/news/randsomcloud-next-frontier-cybersecurity-threats" data-size="large"> <span class="f-icon twitter-icon"></span> </a></div></div> </section><section id="block-glueupadsverticalbottom-2" class="block block-glueup-ads block-glueup-ads-vertical-bottom-block clearfix"><div class="glueup-ads-slick-list"><div class="slick blazy unslick slick--optionset--default slick--less" data-blazy="" id="slick-2"> <a target="_blank" href="https://www.mdcyber.com/events"><img src="https://www.mdcyber.com/sites/default/files/2024-06/Screenshot%202024-06-26%20at%203.29.40%E2%80%AFPM.png" width="200" height="292" alt="" typeof="Image" class="img-responsive"></a><div class="slide__caption"><h2 class="slide__title"></h2></div></div></div> </section></div> </section> <aside class="col-sm-3" role="complementary"><div class="region region-sidebar-second class-region-news-randsomcloud-next-frontier-cybersecurity-threats region-entity-node-canonical"> <section id="block-glueupadsverticaltop" class="block block-glueup-ads block-glueup-ads-vertical-top-block clearfix"><div class="glueup-ads-slick-list"><div class="slick blazy slick--optionset--default" data-blazy="" id="slick-3"><div id="slick-3-slider" data-slick="{"autoplay":true,"arrows":false}" class="slick__slider"><div class="slick__slide slide slide--0"><div class="slide__content"> <a target="_blank" href="https://www.mdcyber.com/sponsor"><img src="https://www.mdcyber.com/sites/default/files/2024-06/Screenshot%202024-06-26%20at%203.20.10%E2%80%AFPM_0.png" width="200" height="292" alt="" typeof="Image" class="img-responsive"></a><div class="slide__caption"><h2 class="slide__title"></h2></div></div></div><div class="slick__slide slide slide--1"><div class="slide__content"> <a target="_blank" href="https://www.mdcyber.com/sponsor"><img src="https://www.mdcyber.com/sites/default/files/2024-06/Screenshot%202024-06-26%20at%203.22.45%E2%80%AFPM_0.png" width="200" height="292" alt="" typeof="Image" class="img-responsive"></a><div class="slide__caption"><h2 class="slide__title"></h2></div></div></div></div> <nav role="navigation" class="slick__arrow"> <button type="button" data-role="none" class="slick-prev" aria-label="Previous" tabindex="0">Previous</button> <button type="button" data-role="none" class="slick-next" aria-label="Next" tabindex="0">Next</button> </nav></div></div> </section><section id="block-glueupadsverticalbottom" class="block block-glueup-ads block-glueup-ads-vertical-bottom-block clearfix"><div class="glueup-ads-slick-list"><div class="slick blazy unslick slick--optionset--default slick--less" data-blazy="" id="slick-4"> <a target="_blank" href="https://www.mdcyber.com/events"><img src="https://www.mdcyber.com/sites/default/files/2024-06/Screenshot%202024-06-26%20at%203.29.40%E2%80%AFPM.png" width="200" height="292" alt="" typeof="Image" class="img-responsive"></a><div class="slide__caption"><h2 class="slide__title"></h2></div></div></div> </section></div> </aside></div></div> <footer class="footer container" role="contentinfo"><div class="region region-footer class-region-news-randsomcloud-next-frontier-cybersecurity-threats region-entity-node-canonical"> <section id="block-webfooter" class="block block-blockgroup block-block-groupweb-footer clearfix"> <section id="block-webfootercenter" class="block block-blockgroup block-block-groupweb-footer-center clearfix"> <section id="block-newsletterfooter" class="footer-block-container block block-eventbank-api block-newsletters-footer-block clearfix"><div class="form-container newsletter-footer-block"><div class="row"><div class="col-xs-12"><div class="title"> Subscribe to our Newsletter</div></div><div class="col-xs-12"> <input class="email-input block-newsletter-input newsletters-email" type="email" name="newsletters-email" placeholder="Enter Your Business Email" value=""> <span class="email-not-valid">Please enter a valid email</span></div><div class="col-xs-12"> <a class="button-submit popup-modal large-button small full signup-button newsletters-signup" href="/newsletter">Sign Up</a></div></div></div> </section><nav role="navigation" aria-labelledby="block-footer-menu" id="block-footer" class="footer-block-container footer-menu"><h2 id="block-footer-menu">Navigate</h2><ul class="menu menu--footer nav"><li class="first"> <a href="/about" data-drupal-link-system-path="node/376">Our History</a></li><li> <a href="/partners" data-drupal-link-system-path="node/385">Partners</a></li><li> <a href="/become-member" data-drupal-link-system-path="node/374">Become a Member</a></li><li> <a href="/events" data-drupal-link-system-path="events">Events</a></li><li class="last"> <a href="/news" data-drupal-link-system-path="node/370">News</a></li></ul> </nav><section id="block-footersocialfollow" class="footer-block-container block block-eventbank-social block-social-follow-footer-block clearfix"><h2 class="block-title">Connect With Us</h2><div class="icon-social-footer"><div class="icon-social-footer-container"><div class="social-footer-follow button-social-media"> <a href="https://twitter.com/CAMIcyberMD" target="_blank"> <span class="f-icon twitter-icon icon-social-media"></span> </a></div><div class="social-footer-follow button-social-media"> <a href="https://www.facebook.com/buymdcyber" target="_blank"> <span class="f-icon facebook-icon icon-social-media"></span> </a></div><div class="social-footer-follow button-social-media"> <a href="https://www.linkedin.com/company/buy-md-cyber-operated-by-the-cybersecurity-association-of-maryland-inc/?viewAsMember=true" target="_blank"> <span class="f-icon linkedin-icon icon-social-media"></span> </a></div><div class="social-footer-follow button-social-media"> <a href="https://www.instagram.com/camicybermd/" target="_blank"> <span class="f-icon instagram-icon icon-social-media"></span> </a></div><div class="social-footer-follow button-social-media"> <a href="https://youtube.com/@CyberAssociation?si=waMUkOuxM4xDcYmX" target="_blank"> <span class="f-icon youtube-icon icon-social-media"></span> </a></div></div></div> </section><section class="views-element-container footer-block-container block block-views block-views-blockcontact-block-1 clearfix" id="block-views-block-contact-block-1"><h2 class="block-title">Contact Information</h2><div class="form-group"><div class="view view-contact view-id-contact view-display-id-block_1 js-view-dom-id-eee820740c3fc552ed8553a02d309d37afca4b72cdb0b9650c53b067cb881bcf"><div class="view-content"><div class="views-row"><div class="views-field views-field-field-location-name"><div class="field-content">Cybersecurity Association, Inc.</div></div><div class="views-field views-field-field-location-address"><div class="field-content">10440 Little Patuxent Pkwy 12th Floor, Columbia, MD 21044</div></div><div class="views-field views-field-field-phone"><div class="field-content">Phone: 443-853-1970</div></div><div class="views-field views-field-field-email"><div class="field-content">Email: <a href="/cdn-cgi/l/email-protection#6a03040c052a0913080f18470b19190509030b1e03050444090507" target="_blank"><span class="__cf_email__" data-cfemail="86efe8e0e9c6e5ffe4e3f4abe7f5f5e9e5efe7f2efe9e8a8e5e9eb">[email protected]</span></a></div></div></div></div></div></div> </section> </section><section id="block-eventbanklinkfooter" class="col-xs-12 block block-eventbank-api block-eventbank-link-block clearfix"><div class="eventank-link-footer"><div class="row"><div class="col-xs-12"><div class="link-footer-container"><div class="link-footer-content"> Powered by <a target="_blank" href="https://glueup.com/" class="eventbank-logo-link"><img alt="Glueup Logo" width="100" height="40" src="/modules/custom/eventbank_api/src/images/glueup-logo-white@2x.png" /></a></div></div></div></div></div> </section> </section></div> </footer></div><script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script type="application/json" data-drupal-selector="drupal-settings-json">{"path":{"baseUrl":"\/","scriptPath":null,"pathPrefix":"","currentPath":"node\/503","currentPathIsAdmin":false,"isFront":false,"currentLanguage":"en"},"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"google_analytics":{"account":"G-QVDXLZS8SB","trackOutbound":true,"trackMailto":true,"trackTel":true,"trackDownload":true,"trackDownloadExtensions":"7z|aac|arc|arj|asf|asx|avi|bin|csv|doc(x|m)?|dot(x|m)?|exe|flv|gif|gz|gzip|hqx|jar|jpe?g|js|mp(2|3|4|e?g)|mov(ie)?|msi|msp|pdf|phps|png|ppt(x|m)?|pot(x|m)?|pps(x|m)?|ppam|sld(x|m)?|thmx|qtm?|ra(m|r)?|sea|sit|tar|tgz|torrent|txt|wav|wma|wmv|wpd|xls(x|m|b)?|xlt(x|m)|xlam|xml|z|zip"},"bootstrap":{"forms_has_error_value_toggle":1,"modal_animation":1,"modal_backdrop":"true","modal_focus_input":1,"modal_keyboard":1,"modal_select_text":1,"modal_show":1,"modal_size":"","popover_enabled":1,"popover_animation":1,"popover_auto_close":1,"popover_container":"body","popover_content":"","popover_delay":"0","popover_html":0,"popover_placement":"right","popover_selector":"","popover_title":"","popover_trigger":"click","tooltip_enabled":1,"tooltip_animation":1,"tooltip_container":"body","tooltip_delay":"0","tooltip_html":0,"tooltip_placement":"auto left","tooltip_selector":"","tooltip_trigger":"hover"},"field_group":{"html_element":{"mode":"full","context":"view","settings":{"classes":"news-top-information","id":"","element":"div","show_label":false,"label_element":"h3","attributes":"","effect":"none","speed":"fast"}}},"superfish":{"superfish-main--2":{"id":"superfish-main--2","sf":{"animation":{"opacity":"show","height":"show"},"speed":"fast","dropShadows":false},"plugins":{"touchscreen":{"mode":"useragent_predefined"},"smallscreen":{"mode":"useragent_predefined","title":"Main navigation"},"supposition":true,"supersubs":true}},"superfish-main":{"id":"superfish-main","sf":{"pathClass":"active-trail","pathLevels":0,"delay":500,"animation":{"opacity":"show","height":"show"},"speed":"fast","dropShadows":false},"plugins":{"smallscreen":{"mode":"window_width","title":"Main navigation"},"supposition":true,"supersubs":true}}},"ajaxTrustedUrl":{"\/search\/node":true},"blazy":{"loadInvisible":false,"offset":100,"saveViewportOffsetDelay":50,"loader":true,"unblazy":false},"blazyIo":{"disconnect":false,"rootMargin":"0px","threshold":[0,0.25,0.5,0.75,1]},"slick":{"accessibility":true,"adaptiveHeight":false,"autoplay":false,"pauseOnHover":true,"pauseOnDotsHover":false,"pauseOnFocus":true,"autoplaySpeed":3000,"arrows":true,"downArrow":false,"downArrowTarget":"","downArrowOffset":0,"centerMode":false,"centerPadding":"50px","dots":false,"dotsClass":"slick-dots","draggable":true,"fade":false,"focusOnSelect":false,"infinite":true,"initialSlide":0,"lazyLoad":"ondemand","mouseWheel":false,"randomize":false,"rtl":false,"rows":1,"slidesPerRow":1,"slide":"","slidesToShow":1,"slidesToScroll":1,"speed":500,"swipe":true,"swipeToSlide":false,"edgeFriction":0.35,"touchMove":true,"touchThreshold":5,"useCSS":true,"cssEase":"ease","cssEaseBezier":"","cssEaseOverride":"","useTransform":true,"easing":"linear","variableWidth":false,"vertical":false,"verticalSwiping":false,"waitForAnimate":true},"user":{"uid":0,"permissionsHash":"f928d51a05d2a8029ed1c2386f367cc7667d86fc8b3fe25c4b527b5696730ac7"}}</script><script src="/sites/default/files/js/js_vCla9F0N0qwHEdnfKI-a5TalCoE65Oe0XlGe5Tmqjrk.js"></script><script src="/sites/default/files/js/js_IsY8oZj3fWKjA_hviFqyjLKhCZ9kT58p3SlFpUbYeNM.js"></script><script src="//cdn.jsdelivr.net/npm/bootstrap@3.4.1/dist/js/bootstrap.min.js" integrity="sha256-nuL8/2cJ5NDSSwnKD8VqreErSWHtnEP9E7AySL+1ev4=" crossorigin="anonymous"></script><script src="/sites/default/files/js/js_4vxUH4WWDLV_rC79cbjYUC4SDtijri2s8wGq789xwHY.js"></script><script src="/sites/default/files/js/js_Q-WqeEces6k-s2ayS_5aC_cD5YW9uV92O5ZId6T4G5E.js"></script><script src="/sites/default/files/js/js_eIhrVEgPt4wdVWxfklRndaiWqzMc_oSXOGb9NEl-_1s.js"></script></body></html>