Thursday, March 28, 2024

New Ransomware Attacks Demand Cash From The Customers of Victims Too

Nowadays ransomware attacks are increasing rapidly, and the threat actors are demanding huge ransom in return. As cybercriminals are making their moves advanced by specializing in ransomware attacks and the newly uncovered attacks are demand ransom from the victim’s customers.

The ransomware attackers are using double extorsion methods to deploy the victim’s data that is being stolen. new attacks are using triple extortion methods with the motive of making more money from the victims through their all malicious activities.

Recently, cybersecurity experts have found an average of 1,000 entities that were attacked by ransomware attacks every week. 

After investigation, the experts pronounced that the attack rate has increased by 21% in the first trimester of 2021 and a 7% increase in April.

The FBI has recently asserted that they have found that the DarkSide hacker group is using the triplet extortion method for ransomware attack on the Colonial Pipeline network.

Apart from this, the Check Point research team has confirmed that DarkSide is using advanced methods in their ransomware attacks.

Top Ransomware Targets

As we said above that the attacks are increasing rapidly in a short period of time, as compared to the earlier report of 2020. And the Check Point research team has noted that nearly 1000 organizations were affected every week.

Among all the sectors, health cares sectors were attacked most among the sectors, as per the volume rate nearly 109 attacks occurred per organization every week.

However, in the ransomware attack on the Colonial Pipeline network, the utility sector has encountered nearly 59 attacks per organization per week. 

On the other side, the legal and insurance sectors have witnessed 34 attacks, and the North American organizations have encountered 29 attacks.

While Europe and Latin America have each encountered 14 attacks each week, but among them all, the Asia Pacific organizations have experienced the highest number of ransomware attacks with 51 per week.

Triple extortion

The triple extortion is recently being used by the attackers, and it started at the end of 2020. However, in this triple extortion method, the attackers send ransom demands also to the customer or any other third party who is lined with the stolen data apart from the attacked organization. 

The very first case of triple extortion is the Vastaamo clinic which is being attacked in October 2020. And here the threat actors have demanded a lump sum amount of ransomware from the clinic.

Moreover, the attackers have also emailed the patients directly and demanded a smaller sum of money from them and if they don’t cooperate with attackers then attackers would leak their therapist session details. 

Recommendations

The analysts of Check Point have affirmed some basic recommendation that is to be followed by the organizations to bypass such unwanted ransomware attacks and here they are mentioned below:-

Have a strict regular checkup on holidays as well as on weekends:-

  • Remember to update your patches timely.
  • Always prefer using anti-ransomware tools.
  • Give a full guide regarding the ransomware attacks to the users.
  • Try to scan your networks so that you can stop ransomware attacks before it starts.

Apart from these things, the Check Point research team is trying their best to overcome such attacks, with advanced methods to stop or mitigate these unwanted ransomware attacks.

So, until then the researchers have strongly recommended all the organizations to follow the recommendations that they have suggested.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles