Ransomware Attack Trends: Let’s Be Aware Of. Ransomware is one challenge facing organizations in all sectors. Besides, geographies are the most insistent and popular. And malware attacks are also on the rise. At the same time, vulnerability ransomware players are changing their model of attack to adapt them to the changes made by organizations.
Since around September 2020, the ransomware triggered one out of four attacks in the IBM Security X-Force Response. In June 2020, attacks in Ransomware seemed to burst. In the same month, IBM Security X-Force repaired or replaced one-third of all the ransomware attacks.
(1) Ransom demand is exponentially increasing. IBM Encryption X-Force has ransom reports of over $40 million in some cases.
(2) Sodinokibi ransomware attacks account for one in three IBM Defense X-Force ransomware cases so far in 2020.
(3) Attackers believe schools and colleges are much more appealing to ransomware attacks because, thanks to COVID-19, they launch classes or play with hybrid environments.
(5) They evaluated 41 percent of all IBM Defense X-Force ransomware attacks targeted organizational technology (OT) networks.
Attack trends Ransomware
Looking at Q2 2020 results, IBM Security X-Force Incident Response’s amount of ransomware attacks have more than tripled compared with the last year. It reflects 32% of the events between April and June 2020 that our team reacted to.
As regards priorities, IBM Security X-Force found a general change in the attacks on ransomware. Ransomware affects the hardest producers. They responded almost a fifth of all accidents this year. The sector of technical services is the second most attacked industry with 17 percent of ransomware attacks. The third position among government agencies is 13% of the attacks.
Threat actors are searching for victims with poor downtime tolerance, such as development networks. Ransomware High-performance companies, because of a halt in activities, will lose millions of dollars daily.
Although ransomware attacks continue to penetrate every corner of the globe, Asia and North America have been hit hardest before this year. They account for 33 and 30 percent of IBM Security X-ransomware Force’s contributions in 2020, respectively.
Ransomware Evolving Tactics
In the IBM Security X-Force commitments, several trends concerning attack techniques and methodology have emerged. The most worrisome of these is a new focus on mixed burnt-out attacks, in which threat actors rob sensitive information from companies before they are encrypted. If victimization fails, attackers will be threatened with the public release of stolen data.
This approach puts numerous victims in a situation of catch-22. They may also experience data violations, loss of data, customer records and pay regulatory fines if they can recover encrypted files from the backup.
Sodinokibi: ITG14 Linked to Organized Crime
IBM Security X-most Force’s common ransomware strain was Sodinokibi, also known as REvil (2020), which this year has capitalized on blended ransomware and extortion attacks. The IBS Security X-Force Ransomware strain was most common in 2020.
Maze: Buer Loader Using
IBM Security X-Force also noted continuing threats on Maze ransomware by 2020 which accounted for 12% of ransomware attacks so far this year. Maze also uses RaaS and the combination of fraud ransomware models and publishes his victims on a publicly accessible blog — similar to Sodinokibi’s techniques.
SNAKE/EKANS: A Modern Industrial Control Hazard
EKANS, the first to be discovered in the mid-December 2019 and making up six percent of the IBM Defense X-Force rankings, was among the most important in 2020 ransomware strains.