Ransomware: Cybercrime groups increase ransom demands – B2B Cyber Security – B2B Cyber Security

3 minutes, 46 seconds Read

As a new report shows, cyber criminals continue to rely on business email compromise in addition to ransomware and use long-known, unpatched vulnerabilities for attacks. The report shows that ransom demands are becoming increasingly outrageous.

The Arctic Wolf Labs Threat Report was created based on threat, malware, digital forensics and incident response case data that Arctic Wolf collects across the security operations framework. It provides deep insights into the global cybercrime ecosystem, highlights global threat trends, and provides strategic cybersecurity recommendations for the coming year.

Ransomware claims increase by 20%

🔎 Overview of the entire root causes of compromises (Image: Arctic Wolf).

Cybercrime has developed into a real business in recent years, with offerings such as ransomware-as-a-service leading to a real “democratization” of the criminal business. Even threat actors without technical know-how can carry out attacks. At the same time, ransomware groups are becoming increasingly aggressive. Manufacturing, services, and education/non-profit sectors were the three industries that appeared most frequently on ransomware leak sites.

In light of international law enforcement efforts and increasing non-payment by victims, the groups are also expanding their list of targets and looking for ways to put even more pressure on victims. The average initial ransom demand rose by 20% to $600.000 compared to the previous year. The public sector, retail, energy and legal sectors each recorded average claims of $1 million or more.

Ransomware groups are coming under increasing pressure

The dismantling of the Lockbit hacker group in “Operation Cronos”, in which international investigators worked together, including the NCA, FBI and Europol, is a current example of ransomware groups coming under increasing pressure. But unfortunately this destruction will most likely only have a short-term effect. Of the large ransomware group, which extorted an average of 1,3 victims per day, only six people were identified and only two of them were arrested. It can therefore be assumed that the same actors will quickly operate again under different names. Great vigilance is therefore still required.

Business Email Compromise remains popular – and less studied

🔎 Top 10 vulnerabilities: More than half of the incidents Arctic Wolf investigated exploited at least one of the following 10 vulnerabilities (Image: Arctic Wolf).

Ransomware may make more headlines, but BEC incidents are effective and much easier to execute. Additionally, typically only the most serious BEC incidents – such as those involving account compromise or other access attempts – result in a full Incident Response (IR) investigation. A ransomware incident is 15 times more likely to lead to an investigation than a BEC incident, even though BEC incidents outnumber ransomware incidents by a factor of 10.

Nonetheless, as in the previous year, BEC incidents accounted for nearly 30% of all incidents investigated by Arctic Wolf® Incident Response during this reporting period, underscoring how much they continue to pose an everyday threat to organizations.

Known vulnerabilities cause 60% of security incidents

In 29% of the non-BEC incidents Arctic Wolf investigated, the attackers exploited a vulnerability in an externally accessible system. In nearly 60% of these incidents, this was a vulnerability that was identified as early as 2022 or earlier, meaning organizations would theoretically have had months to years to patch the affected system or remove (or further secure) external access. Only 11,7% of these non-BEC incidents – or 3,4% of incidents overall – contained a zero-day vulnerability, a previously unknown security risk.

More at ArcticWolf.com


About Arctic Wolf
Arctic Wolf is a global leader in security operations, providing the first cloud-native security operations platform to mitigate cyber risk. Based on threat telemetry spanning endpoint, network and cloud sources, the Arctic Wolf® Security Operations Cloud analyzes more than 1,6 trillion security events per week worldwide. It provides company-critical insights into almost all security use cases and optimizes customers’ heterogeneous security solutions. The Arctic Wolf platform is used by more than 2.000 customers worldwide. It provides automated threat detection and response, enabling organizations of all sizes to set up world-class security operations at the push of a button.


Matching articles on the topic

.related-post {}

.related-post .post-list {
text-align: left;
}

.related-post .post-list .item {
margin: 10px;
padding: 0px;
}

.related-post .headline {
font-size: 17px !important;
color: #ff7f00 !important;
}

.related-post .post-list .item .post_title {
font-size: 16px;
color: #ff7f00;
margin: 10px 0px;
padding: 0px;
display: block;
text-decoration: none;
}

.related-post .post-list .item .post_thumb {
max-height: 150;
margin: 10px 0px;
padding: 0px;
display: block;
}

.related-post .post-list .item .post_excerpt {
font-size: 13px;
color: #3f3f3f;
margin: 10px 0px;
padding: 0px;
display: block;
text-decoration: none;
}

@media only screen and (min-width: 1024px) {
.related-post .post-list .item {
width: 45%;
}
}

@media only screen and (min-width: 768px) and (max-width: 1023px) {
.related-post .post-list .item {
width: 90%;
}
}

@media only screen and (min-width: 0px) and (max-width: 767px) {
.related-post .post-list .item {
width: 90%;
}
}

This post was originally published on 3rd party site mentioned in the title of this site

Similar Posts