Ransomware novità mani con guanti Giacomo Lanzi

Ransomware: recent news 2020/21

Estimated reading time: 7 minutes

As we know, a ransomware is a malware that aims to extort money from victims . The means it uses is encryption to encrypt victim data, both local and in the cloud, and make it inaccessible.

The ransomware is therefore a real cyber blackmail : if the victim refuses to pay the requested sum, not only would he be denied access to his data, but there is also the risk that this data will be totally destroyed by hackers. There is no guarantee that unencrypted data will be returned to payment of the ransom.

The propensity or not to pay a ransom was analyzed by one 2020 study , in which it emerged that the 65% of respondents pay without hesitation. Furthermore, it appears that more than half of the sample paid when they were the victim of an attack. Cyber attacks also hit in Italy and 33% of Italians victim of ransomware stated that, despite having paid the ransom, the data in the possession of the victim have been totally or partially lost . In fact, there is no certainty that, by paying a sum of money, the decryption keys of the files will be delivered.

Ransomware news hacker

Ransomware: recent-news

In 2020 it was stated by Microsoft that Ransomware was a major threat . In fact, it is estimated that digital attacks of this type increased in 2020 compared to the previous year. This also happened in 2021.

Development of techniques

The development of ransomware techniques has been fairly straightforward. The first attacks weren’t as organized as the ones we see now. They were executed by single hackers and were often used to target small groups of people, if not a single user. Small sums of money were extorted from these victims, which over time increased more and more.

The use of Ransomware on a large scale dates back to the last few years: recently, in fact, they have evolved. Now the actors of these ransoms have changed, which are groups of organized cybercriminals .

It is no longer individual users that are being targeted, but large companies and their data . The decision to increase the range of ransomware was a novelty due to the fact that criminals and hackers agreed to press on the urgency of companies to recover high-importance data that cannot be lost and the greater possibility of companies to sell for more substantial redemptions .

Even the moment in which the attack occurs is no longer casual, but the result of a ruthless strategy. In fact, criminals choose holiday moments or moments when the company is weakest , moments in which it is easy for IT technicians to pay less attention to unauthorized access to databases.

Double-extortion-ransomware, one of the latest

Another novelty that has recently emerged about ransomware is the double extortion , a technique that ends up extorting a larger sum of money. This technique puts into practice a double ransom that leverages the victim’s weaknesses.

At first, blackmail is based on access to data, which is denied to the victims. When a first ransom is paid, several cybercriminal gangs ask for a second payment to prevent their data from being made public or released to competing companies .

In this way, companies not only have to pay the first ransom to regain access but will be asked for a second ransom to maintain the confidentiality of data that could still be in the hands of the criminal group.

The ransomware attacks of 2021

Ransomware attacks have skyrocketed and that’s nothing new. In recent years, this new modus operandi of double extortion has turned out to be much more profitable than simply deleting data, which however should not be ruled out as a possibility. Even if the ransom was paid, several companies said they no longer had access to the data.

In 2021, the year with the largest number of ransomware-type attacks ever recorded , there was a total loss of money of $ 6 trillion . The types of ransomware attacks have become increasingly sophisticated and designed to hit company databases at the heart and above all to evade their IT security systems, which unfortunately become obsolete very quickly.

There have been several massive attacks involving different types of companies.

Attack on the Colonial Pipeline Company

One of the most significant attacks was that of the hacker group DarkSide against the Colonial Pipeline Company, which took place in early May 2021 . The immediate damage caused by this attack was the interruption of the supply of fuel that was to arrive in the southern United States of America.

This attack was by far the heaviest of the year 2021, as the Colonial Pipeline is responsible for delivering more than half of the fuel in circulation in that area of the US. The result was devastating not only as regards the way the company reacted, but above all for the reaction of consumers : the rush to fuel . People rushed to fill as many fuel cans as possible, to avoid running out of water, with all the risks that these actions bring with them.

The IT action, which cost the company $ 4.4 million , could very well have been avoided . In fact, once the attack was over and the reports of the cybercriminals’ actions were analyzed, the lack of one of the simplest yet most effective security measures immediately became apparent: multi-factor authentication.

Without the latter, in fact, hackers faced only one barrier to break down before accessing the data , which is why the attack was so simple to carry out. The ease with which the attack hit was key in stimulating further Ransomware attacks , as it paved the way for the likelihood of high-caliber companies sinning from lack of cybersecurity just like the Colonial Pipeline. .

Attack on CNA Financial

Another recorded cyber attack was the one against CNA Financial. This was particularly impressive due to the ease with which the breach occurred against a security system that was considered to be one of the safest .

The consequences of the attack were primarily a network outage and, subsequently, the inability to regain full network operation. There were over 15,000 single victims of this attack . In fact, the attack took place remotely and hit the computers of almost all employees . The ransom demanded (and paid ) amounts to $ 40 million.

The identity of the attacker is unknown, but many details suggest Evil Corp as the perpetrator of the attack. The most obvious clue is the software used, which is called Hades, used in the past by Evil Corp.

Despite this, Evil Corp has never been sanctioned for the damage done to CNA Financial.

New hands with gloves ransomware

How to defend yourself?

As we have seen from the latest ransomware news, it is not easy to recover your data if you are a victim of this type of attack. Even if you decide to pay the ransom, you don’t necessarily get your data back. Consequently, the most effective defense is prevention, which can be done in a number of ways.

SOCaaS and UEBA to identify threats

One of the most effective ways to defend yourself is the UEBA system, integrated into the SOCaaS offered by SOD. This system is based on the analysis of users and entities . While it is easy for a hacker to obtain the login information of a corporate user, it is still difficult to behave normally without arousing suspicion. The UEBA system monitors the behaviors of each user and entity and triggers the alarm if their behaviors change. The change in habits may be legitimate, but in this way we can investigate immediately to mitigate the risk.

The UEBA system works thanks to different algorithms that monitor the habits of the users and systems involved and report any anomalies. Together with SIEM, they are fundamental components of the SOC that we offer to our customers.

Conclusions

In any case, it is advisable not to give in to ransoms for any reason. It is recommended to pay maximum attention to fraud and phishing and to install updated antivirus.

For greater high-level security for your company, do not hesitate to contact us to find out what solutions we can offer to secure your data. We will be happy to answer any questions.

Link utili:

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading

RSS Full Disclosure

  • Disclosing Vulnerability of CLink Office 2.0 May 23, 2022
    Posted by chan chan on May 23Dear Sir/Madam, I would like to submit a vulnerability found on CLink Office 2.0. I had contacted the vendor 60 days before but in vain. # Exploit Title: Multiple blind SQL injection vulnerabilities in in CLink Office 2.0 Anti-Spam management console # Date: 30 Mar 2022 # Exploit Author: […]
  • [tool] tplink backup decryptor. May 23, 2022
    Posted by retset on May 23Yet another "tool" to decrypt a backup configs for some tplink wifi routers. Only tested on latest fw for "Archer C7". I hope that it will be useful for someone. https://github.com/ret5et/tplink_backup_decrypt_2022.bin
  • SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP® Application Server, ABAP and ABAP® Platform (Different Software Components) May 18, 2022
    Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on May 18SEC Consult Vulnerability Lab Security Advisory < 20220518-0 > ======================================================================= title: Multiple Critical Vulnerabilities product: SAP® Application Server ABAP and ABAP® Platform (Different Software Components) vulnerable version: see section "Vulnerable / tested versions" fixed version: see SAP security notes...
  • PHPIPAM 1.4.4 - CVE-2021-46426 May 18, 2022
    Posted by Rodolfo Augusto do Nascimento Tavares via Fulldisclosure on May 18=====[ Tempest Security Intelligence - ADV-03/2022 ]========================== PHPIPAM - Version 1.4.4 Author: Rodolfo Tavares Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents ]================================================== * Overview * Detailed description * Timeline of disclosure * Thanks & Acknowledgements * References =====[ Vulnerability […]
  • LiquidFiles - 3.4.15 - Stored XSS - CVE-2021-30140 May 18, 2022
    Posted by Rodolfo Augusto do Nascimento Tavares via Fulldisclosure on May 18=====[ Tempest Security Intelligence - ADV-12/2021 ]========================== LiquidFiles - 3.4.15 Author: Rodolfo Tavares Tempest Security Intelligence - Recife, Pernambuco - Brazil =====[ Table of Contents]================================================== * Overview * Detailed description * Timeline of disclosure * Thanks & Acknowledgements * References =====[ Vulnerability...
  • Watch multiple LockBit Ransom get DESTROYED Mass PWNAGE at scale! May 18, 2022
    Posted by malvuln on May 18Watch multiple LockBit Ransom get DESTROYED Mass PWNAGE at scale! https://www.youtube.com/watch?v=eg3l8a_HSSU
  • github.com/malvuln/RansomDLLs / Catalog of current DLLs affecting vulnerable Ransomware strains. May 18, 2022
    Posted by malvuln on May 18Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I have used successfully to hijack and intercept vulnerable strains executing arbitrary code pre-encryption. https://github.com/malvuln/RansomDLLs
  • APPLE-SA-2022-05-16-2 macOS Monterey 12.4 May 17, 2022
    Posted by Apple Product Security via Fulldisclosure on May 16APPLE-SA-2022-05-16-2 macOS Monterey 12.4 macOS Monterey 12.4 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213257. AMD Available for: macOS Monterey Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed […]
  • APPLE-SA-2022-05-16-6 tvOS 15.5 May 17, 2022
    Posted by Apple Product Security via Fulldisclosure on May 16APPLE-SA-2022-05-16-6 tvOS 15.5 tvOS 15.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213254. AppleAVD Available for: Apple TV 4K, Apple TV 4K (2nd generation), and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel […]
  • APPLE-SA-2022-05-16-5 watchOS 8.6 May 17, 2022
    Posted by Apple Product Security via Fulldisclosure on May 16APPLE-SA-2022-05-16-5 watchOS 8.6 watchOS 8.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213253. AppleAVD Available for: Apple Watch Series 3 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free […]

Customers

Newsletter