Service · Protection Ransomware · 24·7·365

Le ransomware n'est pas une possibilité lointaine. C'est la menace la plus concrète.

Les organisations européennes sont parmi les plus ciblées au monde. Fortgale identifie l'attaquant en phase précoce — accès initial, escalade, reconnaissance, mouvement latéral — avant qu'il ne touche les données ou les sauvegardes. Confinement médian ~11 minutes.

+48 %Attaques 2025
21 joursDwell time moyen
24·7SOC européen
Fortgale · Ransomware Console
SOC live
EU exposure
HIGH
2025 growth
+48%
Avg dwell
21 d
Détection
EARLY
TimeSevDétectionSrc
10:42P1LockBit IoC · domain controllerL3
10:18P2Lateral movement · ESXi clusterL2
09:55P2Backup deletion · attempt blockedL2
09:21P4Mimikatz signature · isolatedL1
Compliance · ransomware
NIS2 ready
DORA
GDPR · DPA 72h
CSIRT · NIS2 24h
SOC standards
ISO 27001
MITRE ATT&CK
ISO 9001
Why active protection is needed

Backups arrive late. Fortgale arrives earlier.

By the time an attacker reaches the backup, encryption is already imminent. The Fortgale SOC intercepts them 21 days earlier, in the early access stages — when they are still noisy, visible and containable.

01 ·

Detection in the early stages

The SOC acts in the first four stages of the kill chain — initial access, escalation, reconnaissance, lateral movement — during the 21-day average dwell time. MITRE ATT&CK behavioural detection, before the attacker touches data or backups.

02 ·

Threat Intelligence on active groups

Monitoring of C2 infrastructure for LockBit, RansomHub, Play, Akira, Black Basta, Cl0p, Medusa, Qilin, BlackCat. When a group prepares a campaign, Fortgale knows first.

03 ·

Analysts, not just dashboards

SIEM/EDR generate thousands of alerts/day; without specialised analysts they are noise. Fortgale knows the specific TTPs of the groups hitting European markets and recognises an initial access before it becomes compromise.

Proof · European ransomware numbers

Four data points Europe cannot ignore.

Top 5
Most-targeted European countries
(EU industrial heartlands)
+48 %
Attack growth
2025 vs 2024
21 d
Interception window
in early access stages
+61 %
Increase in attacks
against manufacturing
Anatomy of a ransomware attack

Fortgale acts in the first four stages.

Ransomware is not an explosion: it is a 21-day operation. The Fortgale SOC operates in the first four stages, where the attacker is still visible and containable. Exfiltration and encryption do not arrive if interception occurred upstream.

01 · Initial

Initial access

Phishing, exposed VPN/RDP, stolen credentials, known vulnerabilities. Fortgale detects: anomalous logins, impossible geo-velocity, dark-web IoCs, traffic to known C2s.

02 · Esc

Privilege escalation

Kerberoasting, service-account abuse, AD-CS exploitation. Fortgale detects: UEBA patterns, anomalies on Kerberos tickets, Domain Admin escalation outside baseline.

03 · Recon

Internal reconnaissance

Network mapping, critical assets, file servers, backups, AD. Fortgale detects: anomalous SMB enumeration, massive LDAP queries, off-hours internal scans.

04 · Lateral

Lateral movement

Pass-the-Hash, lateral RDP, PsExec abuse toward DC/ESXi/backup. Fortgale isolates here: host isolated in ~8 s, median containment ~11 min. The attack stops.

05 · Avoided

Data exfiltration

Double extortion: confidential data, contracts, IP, emails published on leak sites. Does not occur when Fortgale acts in stages 1-4.

06 · Avoided

Encryption & ransom

Final stage: mass encryption, production halt, ransom demand. Does not occur when Fortgale acts in stages 1-4.

Fortgale perimeter The first 4 stages are the zone where the SOC detects and contains the attacker.
Avoided Exfiltration and encryption do not occur.
Threat intelligence · active groups

Twelve ransomware groups actively tracked.

Every group on this list has hit European customers in the last 24 months. The TTPs are integrated into the SOC's detection rules.

Critical · active

LockBit 4.0

Most active RaaS against European markets. Double extortion, VPN/RDP exploits, aggressive lateral movement.

Critical · 9.8%

RansomHub

RaaS since 2024. 9.8% globally. Targeting critical infrastructure, healthcare, finance, government.

Closed RaaS

Play

Closed group, no public negotiation. Targeting manufacturing, government, transport, legal.

Linux + Windows

Akira

Double extortion, ransomware Linux + Windows + ESXi. Targeting SMEs, education, hospitality.

Ex-Conti

Black Basta

Conti heirs. QakBot distributor. Targeting healthcare, manufacturing, construction, finance.

Supply chain

Cl0p

Zero-day specialist: MOVEit, GoAnywhere, Accellion. Supply chain attacks on finance, healthcare, legal.

Active

Medusa

Public blog with countdown. Targeting education, public sector, manufacturing, healthcare.

VMware ESXi

Qilin · Agenda

Go & Rust, VMware ESXi. Targeting healthcare, critical infrastructure, manufacturing.

SME focus

8Base

Phobos-based. Targeting SMEs, construction, retail, transport.

Ex-Hive

Hunters Int.

Ex-Hive members. Data-theft focus: manufacturing, finance, logistics.

Public auctions

Rhysida

Public auctions of stolen data. Targeting public sector, healthcare, education, defence.

Triple extortion

BlackCat / ALPHV

Rust-based. Triple extortion (encryption + leak + DDoS). Healthcare, energy, manufacturing, finance.

The Fortgale method

Four pillars of ransomware protection.

01

Proprietary Threat Intelligence

Monitoring of groups active against European markets with IoC feeds, MITRE-mapped TTPs, early warning on new campaigns. Distributed to the SIEM via STIX/TAXII.

02

Detection in the early stages

Behavioural detection on the first four stages of the kill chain: anomalous access, privilege escalation, internal reconnaissance, lateral movement. Mimikatz/Cobalt Strike signatures, UEBA patterns, dark-web IoCs.

03

Immediate containment

Host isolation ~8 s, median containment ~11 min. Cross-tool response (EDR, firewall, IAM), direct escalation to the CISO, support for CSIRT notification within 24h NIS2.

04

Incident Response & legal

Chain-of-custody forensics, eradication, recovery, support for national CSIRT (NIS2 24h) and DPA (GDPR 72h) notifications, board and legal communication.

FAQ

Everything to know before talking to our analysts.

How does ransomware spread inside an enterprise?

Phishing (email attachments/links), misconfigured VPN/RDP, unpatched vulnerabilities, software supply chain. 70% abuse stolen credentials or exposed remote access. All vectors leave detectable traces.

Are backups enough?

No. Modern groups (LockBit 3.0, RansomHub) target backups before encryption. Double extortion makes restoration irrelevant if data has already been exfiltrated. Air-gapped immutable backups + early-detection system are required.

At which stage of the attack does Fortgale step in?

In the first four stages: initial access, privilege escalation, internal reconnaissance, lateral movement. This is where — within the 21-day average dwell time before encryption — the attacker is still visible and containable. When Fortgale acts upstream, exfiltration and encryption do not occur.

What should you do if hit right now?

Isolate immediately (cables, WiFi off) but DO NOT power off devices (volatile-memory forensic traces are lost). Don't pay before assessment. Contact IR. Fortgale 24·7: +39 02 3659 8955. NIS2/DORA entities: national CSIRT notification within 24h.

Which sectors are most targeted across Europe?

Manufacturing leads, followed by professional services, IT, transport, construction. Geo: industrial heartlands across Italy, Germany, France and Benelux. No company is too small to be a target.

DPA notification or national CSIRT?

It depends. GDPR personal-data breach → DPA 72h. NIS2 → national CSIRT 24h early warning. The two can coexist. Fortgale supports the entire post-incident process including authority notifications.

Don't wait to be hit

The attacker is already in the early stages. Are you seeing them?

For an average of 21 days the attacker maps the network, escalates privileges, moves laterally — before encrypting. That is the window in which Fortgale acts. A free assessment can reveal whether someone is already in your early compromise stages.

Délai de réponse : < 1 jour ouvré.

Ce site est protégé par reCAPTCHA et la Politique de confidentialité et les Conditions d'utilisation de Google s'appliquent.