Cloud Migration Service Providers

  • BIG Data & Analytics
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Server
  • BlockChain
  • Virtualization
You are here: Home / Virtualization / Cybersecurity Threatscape: Ransomware Reigns, Accounting for 63% of Malware

Cybersecurity Threatscape: Ransomware Reigns, Accounting for 63% of Malware

July 15, 2021 by cbn Leave a Comment

News

Cybersecurity Threatscape: Ransomware Reigns, Accounting for 63% of Malware

  • By David Ramel
  • 07/15/2021

You need only look at recent news headlines to see how costly ransomware attacks are plaguing enterprises these days, but a new report puts some data behind the troubling accounts.

Positive Technologies this week published its Cybersecurity Threatscape Q1 2021 research report, revealing a continuing rise in cyber incidents, with ransomware accounting for nearly two-thirds of all malware attacks.

The report indicates that ransomware is still the most common malware, with its share, among other malware used in attacks on organizations, increasing by seven percentage points compared to Q4 2020, so it now accounts for 63 percent of all malware.


Types of malware (percentage of malware attacks)
[Click on image for larger view.] Types of malware (percentage of malware attacks) (source: Positive Technologies).

“Ransomware is still the malware that is most often used by attackers,” the report says. “In Q1, they demanded astronomical ransoms and refined their arsenal, including adding new ways to hide from security tools.” Those new ways to hide from security tools include using unpopular programming languages, such as Nim, D and Golang.

Email remains the prevailing attack vector, as the bad guys used it in six out of 10 malware attacks on organizations. Individuals, however, are still most often attacked by other means, including banking trojans, spyware and malware that provides remote access to devices.


Methods used for malware distribution
[Click on image for larger view.] Methods used for malware distribution (source: Positive Technologies).

The five most active ransomware programs used in Q1 2021 were:

  1. REvil
  2. Clop
  3. Conti (Ryuk)
  4. Babuk Locker
  5. DoppelPaymer

Anyone reading those aforementioned ransomware headlines may have heard of the Russian ransomware gang REvil, short for “Ransomware evil,” and the report sheds more light on that threat:

In Q1 2021, REvil operators broke all records in ransom demands. They demanded $50 million after attacking the IT company Acer, and, after encrypting the network of the pan-Asian retail chain Dairy Farm Group, demanded 30 million in exchange for a decryptor and nondisclosure of the stolen data. Such large amounts are due to the ask-more-to-get-more tactic. The incident with the retailer FatFace speaks to the success of the campaign. In early January, Conti (Ryuk) operators penetrated the company’s network by conducting a phishing attack, and after seven days of reconnaissance, extracted 200 GB of data and started the encryption process. Initially, the attackers demanded $8 million. However, during the negotiations, the amount was reduced to 2 million, which satisfied both parties.

Due to the fact that some companies refuse to pay the ransom, ransomware operators are forced to come up with new tactics. These days, if the company is refusing to pay, the attackers threaten to report the attack and the data theft to its customers. The fraudsters expect that the customers will persuade the company to pay a ransom to prevent the disclosure of their data.

REvil is also known for attacking meat supplier JBS Foods this spring and Kaseya, an IT software company, over the July 4 holiday weekend, but just lately the gang seems to have gone offline.

While REvil leads the list of known programs used in attacks in Q1, the report also finds that Q1 saw several new pieces of ransomware emerge — for example, Cring, Humble, and Vovalex. “And WannaCry is reported to be running rampant again, which made a name for itself in 2017,” the report says.

Other highlights of the report include:

  • The number of attacks increased by 17 percent compared to Q1 2020, and compared to Q4 2020, the increase was 1.2 percent, with 77 percent being targeted attacks. Incidents involving individuals accounted for 12 percent of the total.
  • The most popular vulnerabilities for attackers this quarter were breaches in the Microsoft Exchange Server software (ProxyLogon) and the outdated file sharing program Accellion FTA. Attackers used a zero-day vulnerability discovered in SonicWall VPN solutions not just to hack the company, but also to launch attacks on its customers. SonicWall presumably failed to notify its customers in time about the identified vulnerability or a need to implement protective measures. The incident supports the argument that software manufacturers should inform their customers as soon as possible about existing vulnerabilities and ways of protecting themselves until a patch is released.
  • More and more cybercriminals are developing malware to conduct attacks on virtualization environments, and some are aggressively trying to exploit vulnerabilities already found in software for deploying virtual infrastructure.
  • The number of attacks targeting IT companies has remained consistently high for a second quarter in a row. In 15 percent of cases during Q1 2021, hackers targeted IT companies to conduct an attack on their customers or to steal customer data. At the beginning of 2021, there were still reports in the media about new victims of the attack on SolarWinds: the company’s customers claim that their networks have been compromised.
  • Telecom companies were twice as likely to be attacked as in Q4 2020. In 71 percent of the attacks, hackers aimed at obtaining data, with a particular interest in the 5G technology. Nine out of 10 incidents saw attackers use malware — most frequently, RATs, which accounted for 55 percent of all attacks.

“To protect from cyberattacks, follow our general recommendations for ensuring personal and corporate cybersecurity,” concluded Positive Technologies, which sells enterprise security solutions. “Also, given the specifics of the attacks in the past quarter, we strongly recommend that you install security updates in a timely manner and pay special attention to protecting virtual infrastructure. You can strengthen security at the corporate perimeter by using modern security tools, for example, web application firewalls for protecting web resources. To prevent malware infection, we recommend using sandboxes to analyze the behavior of files in a virtual environment and detect malicious activity.”

Data backing the report comes from Positive Technologies expertise and investigations, along with data from authoritative sources, the company said.

About the Author

David Ramel is an editor and writer for Converge360.

Share on FacebookShare on TwitterShare on LinkedinShare on Pinterest

Filed Under: Virtualization

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • March 2016
  • October 2014

Recent Posts

  • Top 5 Crypto Gainers Of This Week; Buy The Dip?
  • NTT, Palo Alto partner for managed SASE with AIOps
  • NTT, Palo Alto partner for managed SASE with AIOps
  • Explain Splinterlands: Is Splinterlands An NFT game?
  • Enterprises turn to single-vendor SASE for ease of manageability

Recent Comments

  • Purefit Keto Reviews on Are PDUs Your Best Platform for DCIM Instrumentation?
  • https://gemcr.org/ on 10 Things You Should Know About Deep Learning

Categories

  • BIG Data & Analytics
  • BlockChain
  • CLOUD
  • Data Center
  • IOT
  • Machine Learning & AI
  • SECURITY
  • Server
  • Uncategorized
  • Virtualization

Categories

  • BIG Data & Analytics (2,137)
  • BlockChain (464)
  • CLOUD (3,170)
  • Data Center (643)
  • IOT (2,252)
  • Machine Learning & AI (88)
  • SECURITY (1,549)
  • Server (3)
  • Uncategorized (2,011)
  • Virtualization (331)

Subscribe Our Newsletter

 Subscribing I accept the privacy rules of this site

Copyright © 2023 · News Pro Theme on Genesis Framework · WordPress · Log in