{"id":46367,"date":"2021-12-20T04:14:00","date_gmt":"2021-12-20T09:14:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46367"},"modified":"2021-12-20T04:14:00","modified_gmt":"2021-12-20T09:14:00","slug":"ransomware-in-2022-were-all-screwed","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/12\/20\/ransomware-in-2022-were-all-screwed\/","title":{"rendered":"Ransomware in 2022: We&#8217;re all screwed"},"content":{"rendered":"\n<p>Written by\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/charlie-osborne\/\">Charlie Osborne<\/a> &#8211; <strong>Ransomware<\/strong> is now a primary threat for businesses, and with the past year or so considered the &#8220;golden era&#8221; for operators, cybersecurity experts believe this criminal enterprise will reach new heights in the future.\u00a0<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/hr-platform-kronos-brought-down-by-ransomware-attack-ukg-warns-of-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kronos<\/a>.&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline<\/a>.&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-meat-firm-jbs-says-it-paid-out-11m-after-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">JBS<\/a>.&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kaseya<\/a>. These are only a handful of 2021&#8217;s high-profile victims of threat groups including&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/darkside-the-ransomware-group-responsible-for-colonial-pipeline-cyberattack-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">DarkSide<\/a>,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/revil-ransomware-group-resurfaces-after-brief-hiatus\/\" target=\"_blank\" rel=\"noreferrer noopener\">REvil<\/a>, and&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/blackmatter-ransomware-to-shut-down-affiliates-transferring-victims-to-lockbit\/\" target=\"_blank\" rel=\"noreferrer noopener\">BlackMatter<\/a>.&nbsp;<\/p>\n\n\n\n<p>According to Kela&#8217;s analysis of dark web forum activity, the &#8220;perfect&#8221; prospective\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/this-is-the-perfect-ransomware-victim-according-to-cybercriminals\/\" target=\"_blank\"><strong>ransomware<\/strong> victim in the US<\/a>\u00a0will have a minimum annual revenue of $100 million and preferred access purchases include domain admin rights, as well as entry into Remote Desktop Protocol (RDP) and Virtual Private Network (VPN) services.\u00a0<\/p>\n\n\n\n<p>Over the past few years, we&#8217;ve seen<strong> ransomwar<\/strong>e operators evolve from disorganized splinter groups and individuals to highly sophisticated operations, with separate teams collaborating to target everything from SMBs to software supply chains.\u00a0<\/p>\n\n\n\n<p><strong>Ransomware<\/strong> infection is no longer an end goal of a cyberattack. Instead, malware families in this arena &#8212; including WannaCry, NotPetya, Ryuk, Cerber, and Cryptolocker &#8212; can be one component of attacks designed to elicit a blackmail payment from a victim organization.\u00a0<\/p>\n\n\n\n<p>Cisco Secure calls current <strong>ransomware tactics <\/strong>&#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/black-hat-enterprise-players-face-one-two-punch-extortion-tactics-in-ransomware-attacks\/\" target=\"_blank\">double-extortion<\/a>.&#8221; Victims will have their systems encrypted in one facet of an attack, and a ransom note will demand payment, normally in Bitcoin (BTC). However, to pile on the pressure, ransomware groups may also steal corporate data before decryption and will threaten to publish or sell on this information, too, unless a payment is agreed upon and made. \u00a0<\/p>\n\n\n\n<p>The European Union Agency for Cybersecurity (ENISA) said there was a 150% rise in <strong>ransomware<\/strong> attacks between April 2020 and July 2021. According to the agency, we are experiencing the &#8220;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/ransomware-its-a-golden-era-for-cyber-criminals-and-it-could-get-worse-before-it-gets-better\/\" target=\"_blank\">golden era of ransomware<\/a>,&#8221; in part due to multiple monetization options.\u00a0<\/p>\n\n\n\n<p>This is particularly notable in &#8220;Big Game hunting&#8221; when<strong> ransomware<\/strong> operators will specialize in going after large and profitable companies.\u00a0<\/p>\n\n\n\n<p>With this in mind, what can we expect from <strong>ransomware<\/strong> operators in 2022?  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/ransomware-in-2022-were-all-screwed\/&amp;ct=ga&amp;cd=CAEYAioUMTA4NjU4OTA4MTI1MTMzMzE2MDQyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNHFytwRb41He15an3sxEKE-LpeH4Q\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by\u00a0Charlie Osborne &#8211; Ransomware is now a primary threat for businesses, and with the past year or so considered the &#8220;golden era&#8221; for operators, cybersecurity experts believe this criminal enterprise will reach new heights in the future.\u00a0 Kronos.&nbsp;Colonial Pipeline.&nbsp;JBS.&nbsp;Kaseya. <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/12\/20\/ransomware-in-2022-were-all-screwed\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46368,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-46367","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46367"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46367\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}