• Home
  • Industries
    • Defense
    • Financial
    • Healthcare
  • Services
    • Advisory & Consultation
    • Policy & Plan Development
    • Risk Assessment
    • Incident Response Plans (IRP)
    • Disaster Recovery Plans & Exercises
    • Penetration Testing & Vulnerability Assessment
    • Instructor-Led Training
    • Supply Chain & Third Party Risk Management
    • V-ISO Virtual Information Security Officer
  • CMMC
    • Authorized Certification Assessment (C3PAO)
    • CMMC Readiness Assessment
    • V-ISO Virtual Information Security Officer (CMMC)
    • Instructor-Led Training (ATP)
    • CMMC Explained
  • Training
  • Catapult®
    • About Security Catapult®
    • Security Catapult® Sign Up
    • Security Catapult® Log In
  • About
    • About Us
    • The Monarch ISC Team
    • Monarch Blog
    • Events
  • Home
  • Industries
    • Defense
    • Financial
    • Healthcare
  • Services
    • Advisory & Consultation
    • Policy & Plan Development
    • Risk Assessment
    • Incident Response Plans (IRP)
    • Disaster Recovery Plans & Exercises
    • Penetration Testing & Vulnerability Assessment
    • Instructor-Led Training
    • Supply Chain & Third Party Risk Management
    • V-ISO Virtual Information Security Officer
  • CMMC
    • Authorized Certification Assessment (C3PAO)
    • CMMC Readiness Assessment
    • V-ISO Virtual Information Security Officer (CMMC)
    • Instructor-Led Training (ATP)
    • CMMC Explained
  • Training
  • Catapult®
    • About Security Catapult®
    • Security Catapult® Sign Up
    • Security Catapult® Log In
  • About
    • About Us
    • The Monarch ISC Team
    • Monarch Blog
    • Events
Contact Us
Contact Us
News

DarkSide ransomware explained

By John Rogers 

DarkSide is a ransomware threat that has been in operation since at least August 2020 and was used in a cyberattack against Georgia-based Colonial Pipeline, leading to a major fuel supply disruption along the East Coast of the US. The malware is offered as a service to different cybercriminals through an affiliate program and, like other prolific ransomware threats, employs double extortion that combines file encryption with data theft and is deployed on compromised networks using manual hacking techniques.


What is a Security Risk Assessment?
Next Article

Upcoming Events

June 16 - June 19

CMMC Certified Assessor Class (CCA)

  • Learn More
September 22 - September 26

CMMC Certified Professional Class (CCP)+

  • Learn More
October 14 - October 17

CMMC Certified Assessor Class (CCA)

  • Learn More
View Calendar

Contact The Monarch ISC Team

Your Security,
Our Commitment

At Monarch ISC, we assess your cybersecurity challenges, develop trusted strategies, and implement solutions efficiently. We help secure your business and ensure readiness against cybersecurity threats and CMMC audits with minimal operational disruption.

CAICO ATP LOGO
CYBER AB BADGE
CYBER AB Badge

Services

  • Advisory & Consultation
  • Policy & Plan Development
  • Risk Assessments
  • Incident Response Plans (IRP)
  • Disaster Recovery Plans & Exercises
  • Penetration Testing & Vulnerability Assessment
  • Instructor-Led Training
  • Supply Chain / Third Party Management
  • Monarch ISC V-ISO

Industries

  • Defense
  • Financial
  • Healthcare

CCA & CCP Training

CMMC

  • Authorized Certification Assessment (C3PAO)
  • Readiness Assessment
  • CMMC V-ISO
  • Instructor Lead Training (ATP)
  • CMMC Explained

About Us

  • Meet the Monarch Team
  • About Us
  • Blog
  • Events

Catapult®

  • Security Catapult® Log in
  • Security Catapult® About
  • Security Catapult® Sign Up

Contact Us

  • info@monarchisc.com
  • 22 Free Street
    Ste. 300
    Portland, ME 04101
  • 207 808 0472
  • LinkedIn
Ⓒ 2025 All rights reserved. Monarch ISC

Contact the Monarch ISC Team

207.808.0472

info@monarchisc.com

Click Here to Get Started With Catapult® Free

207.808.0472

info@monarchisc.com