Ransomware gangs adopt new techniques to avoid detection
Despite REvil and some of the other most notorious ransomware gangs being shut down this year, the cybercriminals behind them have continued to develop and succeed with new cross-platform capabilities, updated business processes and more.
Over the past few years, ransomware operations have grown from their clandestine and amateur beginnings to become fully-fledged businesses with distinctive brands and styles that rival each other on the dark web. To raise awareness in advance of Anti-Ransomware Day, the cybersecurity firm Kaspersky has released a new report highlighting some of the new ransomware trends spotted so far this year.
Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.
The first trend of note is the abundant use of cross-platform capabilities by ransomware groups which allow them to damage as many systems as possible using the same malware by writing code that can be executed on multiple systems at once. Conti has been one of the most active groups this year and it developed a variant of its ransomware that can be distributed through select affiliates and targets devices running Linux distros as well as Windows machines.
At the same time, ransomware groups have continued activities to facilitate their business processes. These activities include rebranding to divert the attention of law enforcement as well as updating exfiltration tools. Meanwhile some groups have developed and implemented their own custom and complete toolkits which resemble those put out by legitimate software companies. The Lockbit ransomware group stands out for this as the organization provides regular updates for its toolkits and often applies repairs to its infrastructure.
Taking sides
Ever since Russia’s invasion of neighboring Ukraine began on February 24, it has led businesses, governments and individuals to take sides regarding the conflict.
According to Kaspersky though, this was also the case on cybercrime forums and with ransomware groups who began taking sides. As a result, there were a number of politically motivated attacks during Q1 of this year which cybercriminals carried out either in support of Russia or Ukraine.
One of the new malware strains that was discovered during the conflict is named Freeud and it was developed by Ukraine supporters. Instead of encrypting the systems of its targets, Freud features wiping functionality and if a target contains any items from a list of files, the malware wipes them from a victim’s system.
Senior security researcher at Kaspersky’s global research and analysis team, Dmitry Galov provided further insight on the company’s New Ransomware Trends in 2022 report in a press release, saying:
“If last year we said ransomware is flourishing, this year it’s in full bloom. Although major ransomware groups from last year were forced to quit, new actors have popped up with never before seen techniques. Nevertheless, as ransomware threats evolve and expand, both technologically and geographically, they become more predictable, which helps us to better detect and defend against them."
from TechRadar - All the latest technology news https://ift.tt/7RNB8jq
Comments
Post a Comment