Security News > 2021 > September > Ransomware attacks increased by 288% in H1 2021
The number of ransomware attacks analysed by the team has increased by 288% between January-March 2021 and April-June 2021, with organizations continuing to face waves of digital extortion in the form of targeted ransomware.
22% of ransomware data leaks analysed between April and June were attributed to Conti ransomware, which often uses email phishing to remote into a network via an employee's device.
While the victims of this ransomware strain have faced data encryption, the threat of data leaks, and the wider risk of DDoS attacks disrupting operations, the strain is now believed to be inactive.
One significant trend identified is the prevalent issue of ransomware gangs threatening to leak the stolen sensitive data of non-paying victims to damage organizational reputation.
One notable example is the Colonial Pipeline ransomware attack in June, carried out by affiliates of the DarkSide ransomware.
"Christo Butcher, global lead for threat intelligence at NCC Group, said:"Over the years, ransomware has become a significant threat to organizations and governments alike.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/9rfPc1g4oO0/
Related news
- Black Basta, Bl00dy ransomware gangs join ScreenConnect attacks (source)
- FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks (source)
- FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks (source)
- LockBit ransomware returns to attacks with new encryptors, servers (source)
- Fidelity customers' financial info feared stolen in suspected ransomware attack (source)
- Fidelity customers' financial info feared stolen in suspected ransomware attack (source)
- Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries (source)
- Duvel says it has "more than enough" beer after ransomware attack (source)
- FBI: Critical infrastructure suffers spike in ransomware attacks (source)
- JetBrains TeamCity under attack by ransomware thugs after disclosure mess (source)