

Soti Ransomware

In an evolving ransomware landscape in which adversaries seek to evolve past
the ability of their victims to defend, ransomware groups are shifting their attack
techniques away from phishing to put a greater emphasis on vulnerability abuse.
Vulnerability abuse has grown considerably, both in scope and sophistication, as
we extensively examined in our previous report, Slipping Through the Security
Gaps. And ransomware groups have become more aggressive in their methods
of both extortion and vulnerability exploitation, such as through in-house
development of zero-day attacks and bug bounty programs. Ransomware groups
are willing to pay for the opportunity for financial gain, whether it’s to pay other
hackers to find vulnerabilities in their ransomware software, or to acquire access
to their intended targets via initial access brokers (IABs).
A deeper examination of the data reveals dangerous trends, echoing the
explosion of high-profile attacks in 2022. Trends emerge in the growth of
victims in various industries. Verticals with a rise in Internet of Things device
connections, especially in manufacturing, have incurred a higher ransomware
victim count. Yet, even verticals with a smaller victim count have been greatly
affected, such as in healthcare, in which successful ransomware attacks could
have severe consequences. Attackers are also shifting gears regarding tactics
that can generate a more profitable pathway of value. They are finding more
success as they move away from their initial extortion tactic — encryption — and
focus their efforts more on data theft to gain an advantage over organizations
relying on their backups. Attackers can also resort to multiple extortion tactics,
including harassing the victim’s customers or partners through emails or phone
calls. Indeed, ransomware has evolved into a cybercriminal enterprise that goes
beyond holding files or systems hostage.
We lay out the ransomware landscape in this State of the Internet (SOTI) report
by exploring some of the most effective attack techniques and tools that
ransomware groups are utilizing to achieve initial access through exfiltration. We
also provide an extensive list of safeguarding techniques and recommendations.
It is crucial that both industries and individuals protect themselves from the new
wave of ransomware attacks, and this report will help provide insights for better
defense and risk management of this growing concern.
Get Your Report
Related Report

Announcing Flow-IPC, an Open-Source Project for Developers to Create Low-Latency Applications
In a few words, IPC means separate programs sharing data structures — from file contents to configuration to algorithmic details

Distributed AI Inferencing — The Next Generation of Computing
In 2024, we witnessed an unprecedented explosion in artificial intelligence (AI) innovation, leaving many people in awe of the rapid