sb-as logo
Story image

Business ransomware detections spiking - Malwarebytes

12 Aug 2019

Endpoint protection and remediation solution provider Malwarebytes has released the company’s latest quarterly threat report: Cybercrime techniques and tactics (CTNT): Ransomware retrospective.

This ransomware edition of the CTNT explores the shift in ransomware attacks from consumer targets to organisations, businesses, municipalities and beyond, breaking out attack vectors and trends region by region for an unprecedented view into ransomware behaviour.

In Q2 2019, cybercriminals renewed a ransomware focus on businesses, as consumer detections were poised to dip below business detections of ransomware for the first time, an expression of lost interest from cybercriminals on individual targets as they look to higher-value opportunities.

Moving ahead into the second half of 2019, ransomware is expected to continue to evolve through manual and blended attacks with worm-like functionality, as well as more paired attacks with other malware families.

“This year we have noticed ransomware making more headlines than ever before as a resurgence in ransomware set its sights on large, ill-prepared public and private organisations with easy-to-exploit vulnerabilities such as cities, non-profits and educational institutions,” says Malwarebytes labs director Adam Kujawa.

“Our critical infrastructure needs to adapt and arm themselves against these threats as they continue to be targets of cybercriminals, causing great distress to all the people who depend on public services and trust these entities to protect their personal information.”

Highlights from the report include:

  • Overall ransomware detections against businesses between Q2 2018 and Q2 2019 have risen by 363%.
     
  • From 2018 to 2019, Malwarebytes saw a 235% increase in threats aimed at organisations from enterprises to small businesses, with ransomware as a major contributor.
     
  • Municipalities, educational institutions, and healthcare organisations became prime targets, likely because of legacy infrastructure, outdated hardware and software applications, and lack of security funding in these sectors.
     
  • Top ransomware families overall include: GandCrab, Ryuk, Troldesh, Rapid and Locky. For business detections there was a constant increase in detections of ransomware families, particularly in Ryuk and Phobos. Ryuk detections increased by 88% over last quarter, while Phobos exploded 940% from Q1 2019.
     
  • The rise and alleged retirement of GandCrab leading into the emergence of Sodinokibi ransomware, another Ransomware as a Service (RaaS) using similar technical components.
     
  • Breakdown of ransomware by country (and state), with the US leading at 53% of detections, followed by Canada at 10% and the United Kingdom at 9%.
Story image
Palo Alto Networks extends cloud native security platform with new modules
Palo Alto Networks has announced the availability of Prisma Cloud 2.0, including four new cloud security modules, thus extending its Cloud Native Security Platform (CNSP). More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
NordVPN upgrades infrastructure with launch of colocated servers
"The greatest advantage of having colocated servers is their complete ownership, which guarantees access only by our authorised people."More
Story image
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.More
Story image
CrowdStrike targets Zero Trust blind spot with new offering
CrowdStrike has officially launched CrowdStrike Falcon Zero Trust Assessment (ZTA), designed to aid in overall security posture by delivering continuous real-time assessments across all endpoints in an organisation regardless of the location, network or user. More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More