Special edition of quarterly cybercrime techniques and tactics report showcases evolution of ransomware attacks
Malwarebytes has released the company’s latest quarterly threat report: Cybercrime techniques and tactics (CTNT): Ransomware retrospective. This special, in-depth ransomware edition of the CTNT explores the shift in ransomware attacks from consumer targets to organisations, businesses, municipalities and beyond, breaking out attack vectors and trends region by region for an unprecedented view into ransomware behavior.
As we approached Q2 2019, cybercriminals renewed a ransomware focus on businesses, as consumer detections were poised to dip below business detections of ransomware for the first time, an expression of lost interest from cybercriminals on individual targets as they look to higher value opportunities. Moving ahead into the second half of 2019, ransomware is expected to continue to evolve through manual and blended attacks with worm-like functionality, as well as more paired attacks with other malware families.
“This year we have noticed ransomware making more headlines than ever before as a resurgence in ransomware turned its sights to large, ill-prepared public and private organisations with easy to exploit vulnerabilities such as cities, non-profits and educational institutions,” said Adam Kujawa, Director of Malwarebytes Labs. “Our critical infrastructure needs to adapt and arm themselves against these threats as they continue to be targets of cybercriminals, causing great distress to all the people who depend on public services and trust these entities to protect their personal information.”
Highlights from the report include:
- Overall ransomware detections against businesses between Q2 2018 and Q2 2019 have risen by 363 percent.
- From 2018 to 2019, Malwarebytes saw a 235 percent increase in threats aimed at organisations from enterprises to small businesses, with ransomware as a major contributor.
- Municipalities, educational institutions, and healthcare organisations became prime targets, likely because of legacy infrastructure, outdated hardware and software applications, and lack of security funding in these sectors.
- Top ransomware families overall include: GandCrab, Ryuk, Troldesh, Rapid and Locky. For business detections there was a constant increase in detections of ransomware families, particularly in Ryuk and Phobos. Ryuk detections increased by 88 percent over last quarter, while Phobos exploded 940 percent from Q1 2019.
- The rise and alleged retirement of GandCrab leading into the emergence of Sodinokibi ransomware, another Ransomware as a Service (RaaS) using similar technical components.
- Breakdown of ransomware by country (and state), with the U.S. leading at 53 percent of detections, followed by Canada at 10 percent and the United Kingdom at 9 percent.
Recently launched just this week, Malwarebytes now offers an incident response services to companies under active attack, their Malware Removal Service (MRS). MRS provides rapid expert intervention and triage to effectively manage and isolate a critical malware incident.
For the full report visit https://www.mysecuritymarketplace.com/product/cybercrime-techniques-and-tactics-ctnt-ransomware-retrospective/