Article Details
Scrape Timestamp (UTC): 2023-10-25 14:05:06.286
Original Article Text
Click to Toggle View
Ransomware isn’t going away – the problem is only getting worse. As the world moves steadily to becoming more and more digital, organizations worldwide become increasingly dependent on IT systems to run their services. Threat actors know this fact very well. A short time ago, cyberattacks were used to spread computer viruses to bring harm to target systems, such as making them unstable. However, as modern attack tools developed, a new devastating criminal model appeared that could both harm targeted systems, and extort money from victims by encrypting their files, and taking them hostage. The new attack model is called ransomware, and it is gaining more momentum year after year. According to a recent report by Malwarebytes, Global ransomware attacks have witnessed a boost in 2023. The report recorded 1,900 ransomware attacks against four countries—the US, Germany, France, and the UK—in one year. Ransomware attacks become costly over time too, Cyber Security Ventures predicts by 2031, a ransomware attack will occur every two seconds, costing the world around $265 billion (USD) of losses annually. Is ransomware exclusively focused on big organizations? Most recorded ransomware attacks target big organizations; however, this is no longer the case. Ransomware operators are more frequently targeting small and medium-sized businesses as well as individuals. For instance, with back-to-school, ransomware has risen against schools. According to the Recorded Future, at least 27 schools and districts were hit with ransomware this August (see Figure 1). The ransomware as a Service (RaaS) business model enables cybercriminals lacking technical skills to launch ransomware attacks without developing them. RaaS operators provide the ransomware payload, infrastructure, and payment systems in exchange for an affiliate fee based on successful ransoms. This allows novice attackers to launch devastating ransomware campaigns against various targets and help accelerate the spreading of ransomware attacks worldwide. Recent ransomware attacks Almost every day, we hear in the news about a major ransomware incident that hit a major organization; here are some recent ransomware incidents: Ransomware gangs are using more advanced techniques to infect their targets The huge profits gained from ransomware attacks have made it a lucrative method for cybercriminals to earn money. Ransomware groups often base their ransom demands on a percentage of the victim company's annual revenue, usually around 3%. Hackers invest parts of the ransom payments to develop more robust attack tools and to invent new attack methods. Here are some ransomware attack techniques: A common method for ransomware operators to access targets IT environments is password-related attacks. For instance, credentials stuffing, password spraying, password reset abuse, phishing attacks, password guessing and exploiting default passwords are common password-based attacks leveraged by ransomware groups. The LockBit ransomware was the most deployed ransomware variant in 2022 and continues to be widespread in 2023. The LockBit operators leverage sophisticated techniques to attack their targets, mainly via password-related attacks, such as: How do hackers monetize and exploit bad password behaviors? There are numerous ways that hackers take advantage of poor password practice: To halt ransomware attacks that take advantage of end-users weak password practices, it is advisable to use Specops Password Policy, which extends the functionality of Group Policy in Active Directory and provides advanced password policy features, including: Ransomware continues to evolve as a preferred cybercriminal business model. To fight ransomware, organizations must boost their cyber defenses using a layered security model that involves enforcing strong password policies and deploying different security solutions. For instance, most ransomware attacks begin with a compromised password, so blocking the use of over 4 billion unique compromised passwords helps prevent all cyberattacks that take advantage of this attack vector. Sponsored and written by Specops Software.
Daily Brief Summary
Cyberattacks are steadily evolving, with ransomware attacks becoming a major concern due to their capacity to both harm systems and extort money from victims.
A recent report by Malwarebytes revealed a significant rise in global ransomware attacks in 2023, with 1,900 recorded against the US, Germany, France, and the UK combined.
Cyber Security Ventures estimates that a ransomware attack will occur every two seconds by 2031, resulting in annual losses of approximately $265 billion worldwide.
Although originally most targeted at larger organizations, ransomware attackers are broadening their scope to include small and medium enterprises as well as individuals.
The Ransomware as a Service (RaaS) business model has facilitated the spread of these attacks, providing the necessary infrastructure and payment systems for less technically skilled criminals to engage in ransomware attacks.
Poor password practices remain a common vector for ransomware attacks, underscored by the widespread use of the LockBit ransomware, highlighting the need for stronger password policies to mitigate such threats.
To defend against ransomware, organizations are encouraged to adopt robust cybersecurity solutions, including those that block compromised passwords, often a point of vulnerability.