{"version":"1.0","provider_name":"Forescout","provider_url":"https:\/\/www.forescout.com","author_name":"Tim Ferman","author_url":"https:\/\/www.forescout.com\/blog\/author\/tim-ferman\/","title":"Ransomware Protection: Mitigating IoT and OT Threats - Forescout","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Dqlu06xHVd\"><a href=\"https:\/\/www.forescout.com\/when-ransomware-meets-iot-and-ot\/\">Ransomware Protection: IoT and OT<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.forescout.com\/when-ransomware-meets-iot-and-ot\/embed\/#?secret=Dqlu06xHVd\" width=\"600\" height=\"338\" title=\"&#8220;Ransomware Protection: IoT and OT&#8221; &#8212; Forescout\" data-secret=\"Dqlu06xHVd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2023\/10\/ransomware-Iot-OT.png","thumbnail_width":892,"thumbnail_height":803,"description":"Whether it's the exploitation of IoT devices for initial access, deployment of cryptominers in IT devices, or use of poor OT security, these attacks can cause significant disruptions and financial losses, with sophisticated ransomware gangs often targeting multiple companies or government agencies at once."}