The evolution of ransomware strategies

0 19
Welcome to the new 132 cyber warriors who joined us last week. Ea...

Welcome to the new 132 cyber warriors who joined us last week. Each week, we'll be sharing insights from the MEA community. Read exclusive interviews with industry experts and key findings from the #BHMEA stages.

Keep up with our weekly newsletters on LinkedIn — subscribe here.

The evolution of ransomware strategies

Your weekly delivery of interviews and insights from the global MEA community. 

This week we’re focused on…

How ransomware attack strategies have changed over time. 

Why? 

Because we interviewed Stuart Seymour (CISO at Virgin Media), and when we asked him how his perspective on security has changed over the course of his career, he pointed out that it has had to change – because threats and threat actors have evolved significantly.

“You need only to look at ransomware,” he said, “originally it was, ‘I will encrypt your data and hold you to ransom for the keys’. That evolved to ‘I will encrypt and exfiltrate’, and then ‘I will encrypt, exfiltrate and put pressure (publicly) for you to comply with my demands’.” 

Shifts in the social engineering strategies used by ransomware groups have happened in conjunction with advancements in the technology available to those threat actors. 

But today, it’s the social engineering tactics that drive the most urgency for ransomware targets – who come under immense pressure to respond, or risk public (and potentially permanent) reputational damage. 

Ransomware has been a persistent threat for decades

In the late 1980s, an early form of ransomware called the AIDS Trojan (or the PC Cyborg) was distributed to targets via floppy disks, which then encrypted file names on the infected system – with the assurance that file names would be decrypted if the victim paid a ransom. 

Moving into the mid 2000s, ransomware including Gpcode and Archiveus leveraged more sophisticated encryption methods that made it more difficult for files to be decrypted without the victim paying the ransom. 

In 2013, the emergence of CryptoLocker marked an important advancement in ransomware techniques; with military-grade encryption that was distributed via email attachments and botnets. It proved the efficacy of phishing for victims, and launched a new wave of ransomware strains across the internet. 

Three years later in 2016, Petya became one of the first ransomware variations to take a new approach: overwriting victims’ Master Boot Record so that operating systems couldn’t boot until the ransom was paid. It was a more extreme approach than the standard (up to then) practice of encrypting files on a system, rather than holding the system itself to ransom. 

More recently in 2021, we saw the emergence of Ransomware-as-a-service (Raas). 

And then last year in 2023, threat groups including BlackCat/ALPHV and AvosLocker leveraged the potential of RaaS even further – with triple extortion RaaS. This means that RaaS services are able to not only encrypt data and threaten to release it, but also apply additional extortion tactics to form a comprehensive service for attackers. 

Attacks are becoming more complex – and harder to mitigate 

Developments in ransomware technologies are one thing, and the evolution of social engineering strategies that increase pressure on victims is another thing. But together, they form an overall advancement in ransomware that makes it very difficult to defend compromised victims. 

In the field of cybersecurity, research, education and tooling has to take into account both aspects of advancement. We can’t just improve cyber awareness, and we can’t just improve cybersecurity tooling. 

Threat actors are innovating both in the technological factor and the human factor all the time. 

So to stay ahead, the cybersecurity sector must do the same: ensuring that both tech and people are working to increase cyber resilience and mitigate the threat of ransomware for organisations across industries. 

Join the conversation

We want to know about the ransomware advancements that have struck you as the most influential (or dangerous) in recent years. Open this newsletter on LinkedIn and tell us in the comment section. We might get in touch to feature your opinion in a future newsletter. 

Read our full interview with Stuart Seymour: A journey towards leadership in cybersecurity

Do you have an idea for a topic you'd like us to cover? We're eager to hear it! Drop us a message and share your thoughts. Our next newsletter is scheduled for 24 July 2024.

Catch you next week,Steve DurningExhibition Director

Join us at MEA 2024 to grow your network, expand your knowledge, and build your business.

REGISTER NOW
你可能想看:

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

3.4 Multi-cluster Resource Management Solution - Cluster Federation (Federation)

3 JD open-source hotkey—Automatic detection of hotkey, distributed consistency caching solution

CyberVolk ransomware activity

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

最后修改时间:
admin
上一篇 2025年03月22日 23:02
下一篇 2025年03月22日 23:25

评论已关闭