HomeMalware & ThreatsDecline in Relevance for Underground Ransomware

Decline in Relevance for Underground Ransomware

Published on

spot_img

Ransomware groups, once the reigning kings of the cybercrime world, are now facing a decline in their influence and profitability. The chaos and disruption they have historically brought seem to be overshadowing the dwindling profits and attention they are currently garnering.

According to cybersecurity firm Cyble, ransomware groups collectively targeted 590 new victims in January, 886 in February, and over 564 in March of this year. These figures represent the highest numbers on record for the first quarter, with healthcare providers and schools bearing the brunt of these attacks.

Despite the surge in attacks, ransomware hackers are facing a significant drop in profits. Chainalysis reports that their profits fell by one-third, from $1.25 billion in 2023 to $818 million in 2024. This decrease can be attributed to fewer victims choosing to pay the ransom and those who do, paying less than before. To compensate for lower ransom payments, attackers are now targeting a higher volume of victims.

The landscape of the criminal underground behind ransomware attacks is evolving rapidly, with new groups emerging as established ones fade away due to law enforcement disruptions and fatigue. Fresh players like Arkana Security, Secp0, and Skira Team have recently entered the scene, following the appearance of groups like Weyhro and Frag late last year.

Some newer groups are even adopting the names of infamous predecessors in a bid to capitalize on their reputation. For example, the Babuk 2.0 group claims to be a reemergence of the original Babuk group, which went dark in 2021. However, security experts have cast doubts on the authenticity of their claims, pointing out that their ransomware code is a rebranded version of the leaked LockBit 3.0 source code.

The declining profitability of ransomware groups can also be attributed to a shift in their tactics. Rather than focusing solely on encrypting systems, many hackers are now opting to steal data and demand ransom for its deletion. This strategy is intended to capitalize on organizations’ fear of data leaks and their willingness to pay to prevent the exposure of sensitive information.

The diminishing power of ransomware groups to capture attention is also evident in their recent attacks. Amid ongoing geopolitical tensions, such as the Russia-Ukraine conflict and the economic sanctions imposed on Russia, hackers may be more cautious about targeting large American organizations that could trigger further repercussions.

Overall, while ransomware groups continue to pose a threat to organizations, signs of their business model being on shaky ground are becoming more apparent. As defenses strengthen and victims become more resilient, the era of rampant ransomware attacks may be slowly coming to an end. However, predicting the complete demise of ransomware would be premature, as threat actors are known to adapt and innovate in response to challenges in the cybersecurity landscape.

Source link

Latest articles

Bengaluru court rejects bail in Rs 90 lakh cyber fraud case, citing risk to financial trust

In a recent development in the city of Bengaluru, a civil and sessions court...

APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced...

Chinese hackers have updated the MysterySnail malware to infiltrate sensitive government networks.

An upgraded version of the MysterySnail remote access trojan (RAT) malware has been uncovered...

Improve Organization with Project Management Skills

In the world of cybersecurity, professionals are often trained to focus on vulnerabilities, exploits,...

More like this

Bengaluru court rejects bail in Rs 90 lakh cyber fraud case, citing risk to financial trust

In a recent development in the city of Bengaluru, a civil and sessions court...

APT29 utilizes GRAPELOADER Malware Targeting European Diplomats via Wine-Tasting Lures – Source:thehackernews.com

In a recent cyber attack, the infamous Russian state-sponsored threat actor APT29 has resurfaced...

Chinese hackers have updated the MysterySnail malware to infiltrate sensitive government networks.

An upgraded version of the MysterySnail remote access trojan (RAT) malware has been uncovered...