Security News > 2024 > March > FBI: Critical infrastructure suffers spike in ransomware attacks
"Cybercriminals continue to adjust their tactics, and the FBI has observed emerging ransomware trends, such as the deployment of multiple ransomware variants against the same victim and the use of data-destruction tactics to increase pressure on victims to negotiate," according to the IC3 report.
Crooks had no qualms about infecting critical infrastructure organizations with ransomware.
The US counts 16 industries as critical infrastructure, and 14 of these had at least one member report a ransomware attack to the IC3.
The IC3 received 1,193 complaints from organizations belonging to a critical infrastructure sector that were affected by a ransomware attack, up 37 percent from 870 in 2022.
Of the 16 critical infrastructure sectors, IC3 reporting indicated 14 sectors had at least one member that fell to a ransomware intrusion in 2023.
The five top ransomware variants infecting critical orgs, as reported to the IC3, were LockBit, ALPHV/Blackcat, Akira, Royal, and Black Basta.
News URL
https://go.theregister.com/feed/www.theregister.com/2024/03/06/fbi_ransomware_cybercrime_costs/
Related news
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- New IOCONTROL malware used in critical infrastructure attacks (source)
- CISA confirms critical Cleo bug exploitation in ransomware attacks (source)
- Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks (source)
- Massive PSAUX ransomware attack targets 22,000 CyberPanel instances (source)
- North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- City of Columbus: Data of 500,000 stolen in July ransomware attack (source)
- Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack (source)
- CISA warns of critical Palo Alto Networks bug exploited in attacks (source)