Security News > 2021 > May > Double-extortion ransomware attacks on the rise
Zscaler announced a report featuring analysis of key ransomware trends and details about the most prolific ransomware actors, their attack tactics and the most vulnerable industries being targeted.
"Over the last few years, the ransomware threat has become increasingly dangerous, with new methods like double-extortion and DDoS attacks making it easy for cybercriminals to sabotage organizations and do long-term damage to their reputation," said Deepen Desai, CISO and VP of Security Research at Zscaler.
"Our team expects ransomware attacks to become increasingly targeted in nature where the cybercriminals hit organizations with a higher likelihood of ransom payout. We analyzed recent ransomware attacks where cybercriminals had the knowledge of things like the victim's cyber insurance coverage as well as critical supply-chain vendors bringing them in the crosshairs of these attacks."
In late 2019, there was a growing preference for "Double-extortion" attacks in some of the more active and impactful ransomware families.
Many different industries have been targeted over the past two years by double-extortion ransomware attacks.
Maze/Egregor: Originally encountered in May 2019, Maze was the ransomware most commonly used for double-extortion attacks until it seemingly ceased operations in November 2020.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/eQBa2JsDpJA/
Related news
- UK health services call-handling vendor faces $7.7M fine over 2022 ransomware attack (source)
- McLaren hospitals disruption linked to INC ransomware attack (source)
- Six ransomware gangs behind over 50% of 2024 attacks (source)
- CISA warns of Jenkins RCE bug exploited in ransomware attacks (source)
- CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks (source)
- Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds (source)
- Most ransomware attacks occur between 1 a.m. and 5 a.m. (source)
- New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data (source)
- Lateral movement: Clearest sign of unfolding ransomware attack (source)
- BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave (source)