Subscribe to our Newsletter!
By subscribing to our newsletter, you agree with our privacy terms
Home > Cybersecurity > Ransomware, the danger lives next door
February 02, 2022
Of those who were approached for help with ransomware attacks, 49% reported the incident to federal agents and only 18% made both internal and external reports.
Most of the time, contact from recruiters was made by email (59%). Other means used were telephone (27%) and social media (21%).
Source: Hitachi ID
Many of the companies surveyed consider themselves prepared to defend against ransomware attacks, relying solely on network perimeter defense – the majority of decision-makers (45%) say they primarily use this type of cybersecurity technique, with 6% using perimeter defense exclusively. And that’s exactly where the weak link in the cybersecurity resource chain may lie, as it only targets malicious actors from the outside rather than any internal professionals recruited by ransomware gangs who may operate at the perimeters of the organization.
Overall, 57% of respondents reported that they were offered cash or bitcoins worth less than $500,000.
Finally, of the 65% of companies whose members were approached to help with ransomware attacks, 49% ended up being victims of this type of cybercrime. Most, according to the study, consulted external advisors before acting and were advised not to pay the ransom; 26% paid the ransom, 29% did not pay the ransom and 32% chose not to comment.
Not only malicious employees recruited by cybercrime can be internal enablers of ransomware attacks, but also the unwary.
Of the total incidents that applied the “self-install technique”, 71% used compressed files with JavaScript, 7% used compressed executables and 4% included Excel macros.
The other two attack vectors were the exploitation of software vulnerabilities within perimeters (4% of all ransomware incidents) and third-party access abuse (3%, for example, via attacks on the software supply chain or use of compromised privileged credentials). In the first situation, attackers targeted servers running Windows operating systems and exploited a vulnerable version of WordPress, a popular content management system. In the second case, the privileged credential access was remote using Microsoft’s Remote Desktop Protocol (RDP) or a Citrix gateway.
The top malware families that were attributed to ransomware operations identified by Expel were the Gootkit loader (44% of incidents), the SocGholish framework (15%), and the Beacon agent of the Cobalt Strike tool (3%).
November 25, 2022
November 14, 2022
November 03, 2022
October 18, 2022
October 13, 2022
October 05, 2022
September 19, 2022
Previous
Time to mature critical infrastructure defenses
Next
Mirai still threatens IoT ecosystem