The Next Ransomware Wave
Welcome to Trend Micro’s monthly newsletter, The Strategic CISO. Discover the latest and most popular blogs from the CISO Resource Center, a dedicated space for the latest strategic insights, best practices, and research reports to help security leaders better understand, communicate, and minimize cyber risk across the enterprise.
Our goal is to inform security leaders about best practices, the latest industry insights, and more. Let us know what you would like to see from The Strategic CISO newsletter.
LockBit Attempts to Stay Afloat With a New Version
Recently, we came into possession of a sample that we believe represents a new evolution of #LockBit: an in-development version of a platform-agnostic malware-in-testing that is different from previous versions. The sample appends a “locked_for_LockBit” suffix to encrypted files which, being part of the configuration and therefore still subject to change, leads us to conclude that this is an undeployed upcoming version from the group.
Based on its current developmental state, we are tracking this variant as LockBit-NG-Dev, which we further believe could form the basis of a LockBit 4.0 that the group is almost certainly working on. The criminal group behind the LockBit ransomware has proven to be successful in the past, having consistently been among the top impactful #ransomware groups during their whole operation. In the last couple years, however, they seem to have had a number of logistical, technical, and reputational problems.
This has forced LockBit to take action by working on a new much-awaited version of their #malware. However, with the seeming delay in the ability to get a robust version of LockBit to the market, compounded with continued technical issues — it remains to be seen how long this group will retain their ability to attract top affiliates and hold its position. In the meantime, it is our hope that LockBit is the next major group to disprove the notion of an organization being too big to fail.
Find out more on how LockBit is staying afloat in our blog, "LockBit Attempts to Stay Afloat With a New Version"
#SXSW Recap: AI's Role in Virtual Kidnapping
As early adopters of emerging technology and fast-rising social platforms, young people and public figures are more prone to having their #biometrics harvested for use in virtual kidnapping attacks. Social networking sites such as #TikTok, Facebook, and Instagram make it even more convenient for criminals to search for victims and get targeted context to make the scam as believable as possible.
Virtual kidnapping, in essence, is a deception campaign that uses misinformation for the purpose of tricking victims into paying a ransom. Victims don’t just lose money from this scheme, they also suffer from great emotional distress. Even if they don’t pay the ransom and are quickly able to debunk the fraud, believing one’s child has been kidnapped — no matter how momentary — is deeply unsettling to parents. Unfortunately, virtual kidnappers can launch attacks on countless victims (and, sadly, subject all of them to extreme and only need to succeed very infrequently to make a lot of money.
The typical elements of a virtual kidnapping attack are as follows:
See how AI is playing a role in virtual kidnapping here.
Agenda Ransomware Group's Use of its Latest Rust Variant
Since its discovery in 2022, the Agenda Ransomware group (also known as Qilin) has been active and in development. #Agenda, which Trend Micro tracks as Water Galura, continues infecting victims globally with the US, Argentina, and Australia, and Thailand being among its top targets (based on the threat actor’s leak site data). Meanwhile the Agenda #ransomware was used to target several industries, such as finance and law.
Furthermore, based on Trend threat intelligence data, Agenda ransomware detections increased beginning December 2023, in contrast to the number of detections in November, which shows that its operators are either becoming more active, or are reaching a greater number of targets.
We recently encountered updated versions of the ransomware, specifically for its Rust variant. Based on what we’ve observed, Agenda ransomware group uses Remote Monitoring and Management (RMM) tools, as well as Cobalt Strike for deployment of the ransomware binary. As for the Agenda ransomware executable, it can also propagate via PsExec and SecureShell, while also making use of different vulnerable SYS drivers for defense evasion.
Find out more in our blog, "Agenda Ransomware Propagates to vCenters and ESXi via Custom PowerShell Script"
NIST Launches Cybersecurity Framework (CSF) 2.0
The most noteworthy change is the introduction of Governance as a sixth pillar in the #CSF Framework. This shift sees governance being given significantly more importance from just a mention within the previous five Categories to now being its owna separate Function.
According to #NIST the Govern function refers to how an organization’s, “cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored.” This is a positive and needed evolution, as when governance is weak, it often isn’t restricted to a single function (e.g. IAM) and can be systemic.
Governance aligns to a broader paradigm shift where we see cybersecurity becoming highly relevant within the business context as an operational risk. The Govern expectation is cybersecurity is integrated into the broader enterprise risk management strategy and requires dedicated accountability and oversight.
There are some other reassignments and minor changes in the remaining five Categories. CSF version 1.0 was published in 2014, and 1.1 in 2018. A lot has changed in security since then. The 2.0 update acknowledges that a review has been conducted.
As a framework, the CISO domain has not radically changed. Yes, the technology has radically evolved, but the greatest evolution in the CISO role really has been around governance: greater interaction with C-suite and board, while some activities have been handed off to operations.
Learn more about the new Cybersecurity Framework 2.0 in our blog, "NIST Launches Cybersecurity Framework (CSF) 2.0"
Women's History Month - The Power of Listening
In honor of Women's History Month we want to highlight our Trend Talks Life mini-series where host Erin Tomie talks with Technical Account Manager Team Lead for India, Nutan Savani, about her journey at Trend Micro.
In this special Trend Talks Life mini-series, we are spotlighting some of our exceptional female Trenders, who were nominated for their invaluable contributions. In each video we explore this year’s theme: Inspire Inclusion.
Watch the full video here to learn more about how Nutan and other inspiration women leaders at Trend Micro inspire inclusion. #WHM
Before you go:
Check out our new episode of #TrendTalksThreats on Spotify. Jon Clay, VP of Cybersecurity breaks down some of the most notable stories from Trend Micro’s recently released 2023 Annual Cybersecurity Report.