Fueled by cryptocurrencies, ransomware was involved in 79 per cent of the global incidents in the last 18 months of pandemic, led by Conti and REvil ransomware attacks, a new report showed on Monday.


Cryptocurrency will continue to fuel cybercrimes such as ransomware and malicious cryptomining, and the trend will continue until global are better regulated, according to researchers from global cyber security firm Sophos.





Over the coming year, the ransomware landscape will become both more modular and uniform, with attack “specialists” offering different elements of an attack “as-a-service” and providing playbooks with tools and techniques that enable different adversary groups to implement very similar attacks.


Some of the most high-profile ransomware attacks of the year involved ransomware-as-a-service (RaaS), including an attack against Colonial Pipeline in the US by a ‘DarkSide’ affiliate.


An affiliate of Conti ransomware leaked the implementation guide provided by the operators, revealing the step-by-step tools and techniques that attackers could use to deploy the ransomware.


“Ransomware thrives because of its ability to adapt and innovate,” said Chester Wisniewski, principal research scientist at Sophos.


“In 2021, RaaS developers are investing their time and energy in creating sophisticated code and determining how best to extract the largest payments from victims, insurance companies, and negotiators,” Wisniewski said in a statement.


During 2021, Sophos researchers uncovered cryptominers such as Lemon Duck and the less common, MrbMiner, taking advantage of the access provided by newly-reported vulnerabilities and targets already breached by ransomware operators to install cryptominers on computers and servers.


The use of multiple forms of extortion by ransomware attackers to pressure victims into paying the ransom is expected to continue and increase in range and intensity, the report noted.


“It is no longer enough for organisations to assume they’re safe by simply monitoring security tools and ensuring they are detecting malicious code,” said Wisniewski.


–IANS


na/ksk/

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.

We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *