Threat Spotlight: Data Extortion Ransomware - Key Trends in 2023
Ransomware Trends Overview
As ransomware’s fundamental nature shifts from encryption to data exfiltration, organizations’ data backup and recovery practices no longer protect them from attacks. Over the course of the past few years, the cybercriminal landscape changed too.?
More and more criminal #ransomware organizations are adopting “as-a-Service” business models on the dark web which open the door to attackers of all levels participating. Cybercriminals can now purchase the entire ransomware infrastructure on the dark web.?
For this analysis, the Flare research team reviewed data from thousands of double and triple extortion ransomware attacks to identify trends around:
Read our full report, Data Extortion Ransomware & The Cybercrime Supply Chain: Key Trends in 2023, and/or continue reading for the highlights.
How to “Talk” Ransomware
As ransomware attacks have changed over the years, the vocabulary that discusses different actors and variants has evolved too. Some key terms used when discussing ransomware organizations and variants include:
Ransomware Groups and Data Extortion
Ransomware groups exist within a broader #cybercrime ecosystem that includes cybercriminals selling resources like:
Additionally, ransomware organizations are self-sufficient entities that take on different business models, including:
The different business models impact how the cybercriminal organization operates within the broader ecosystem.?
Infostealers, Dark Web Marketplaces, and Paid Telegram Channels
Often underestimated, infostealer malware and stealer logs infect victim computers mainly through cracked software downloads, malvertising, and phishing emails. Once executed, the malware exfiltrates devices’ data, including the browser fingerprint containing stored credentials, active session cookies, credit card information, and host information.
Ransomware groups can purchase this data on dark web marketplaces and illegal Telegram channels enabling access to:
According to Flare's research, a sample of 20+million unique stealer logs identified:
Malware-as-a-Service (MaaS), Phishing-as-a-Service (PaaS), and Cybercrime Infrastructure Vendors
MaaS and PaaS vendors provide the infrastructure and malware necessary for cybercriminals to access privileged systems.?
Examples of the services these criminal organizations provide include:
With these services, unsophisticated ransomware operators can quickly, efficiently, and successfully deploy attacks.
领英推荐
Initial Access Brokers (IABs) and Obtaining Privileged Access?
Operating largely on the Exploit and XSS forums, IABs specialize in gaining and selling access to corporate IT environments. While IABs only post one or two listings per day, the listings are often high-quality, containing the access ransomware operators need to compromise network and infrastructure.?
Tor Ransomware Blogs
Ransomware groups use these to communicate with affiliates, often posting updates like:
Cybercriminals can use these websites to pressure victims into paying the ransom.?
Ransomware, Data Extortion, and the Explosive Growth of Organized Cybercrime
To understand key ransomware trends in 2023, Flare analyzed more than 80 ransom publications over more than 18 months, comprising thousands of events.
According to this research, we found a 112% annualized increase in data extortion tactics primarily targeting the following industries:
Our analysis of the groups and affiliates responsible for the majority of attacks found the following most prominent ones:
Ransomware Prevention Recommendations?
Addressing Primary Ransomware Attack Vectors
The three primary attack vectors that ransomware organizations target are:
Preventing and Identifying Stealer Logs and Leaked Credentials
With a new class of RAT dubbed infostealer malware, stealer logs have become a greater threat, especially those containing active session cookies that allow attackers to bypass two-factor authentication (2FA) and multi-factor authentication (MFA).?
Since people often reuse passwords across multiple services, ransomware operators can use stolen credentials as an easy entry point, giving them the opportunity to move laterally and attempt to access AD. At that point, they escalate privileges to steal files.?
Ransomware Prevention Best Practices for Blue Teams
How Flare Can Help: Ransomware Threats
Flare’s proactive external cyber threat exposure management solution constantly scans the online world, including the clear & dark web and illegal Telegram channels.?
With 4,000 cybercrime communities monitored, our platform provides data from 14 million stealer logs and two million threat actor profiles. Since our platform automatically collects, analyzes, structures, and contextualizes dark web data, you gain the high-value intelligence specific to your organization for faster dark web investigations and significant reduction in data leak incident response costs.
Sign up for a free trial to learn more about threat exposure management with Flare.
Founder & CEO, NetSecurity Corp. | Inventor and Architect of ThreatResponder? Platform, a Cyber Resilient Endpoint Innovation | Cybersecurity Visionary, Expert, and Speaker
1 年This shift challenges the conventional reliance on data backup and recovery practices as foolproof protection against attacks.