HomeCyber BalkansRansomware Gangs Encrypt Systems Within 17 Hours of Initial Infection

Ransomware Gangs Encrypt Systems Within 17 Hours of Initial Infection

Published on

spot_img

Ransomware gangs have been ramping up their operations, now deploying encryption just 17 hours after initially compromising a system, according to recent cybersecurity analyses. This represents a departure from previous tactics, where attackers would spend days or even weeks lurking in networks to maximize surveillance and control.

Some groups, like Akira, Play, and Dharma/Crysis, have taken it a step further by reducing their time-to-ransom to as little as 4-6 hours, showcasing their operational efficiency and agility. This swift execution leaves organizations a narrow window to detect and respond to intrusions, underscoring the evolving landscape of cyber threats.

The trend also underscores the growing sophistication of ransomware groups as they leverage advanced tools and techniques to achieve their objectives swiftly. While encryption remains a key strategy for many ransomware operators, there has been a noticeable shift towards data exfiltration and extortion.

Groups like BianLian have shifted their focus away from encryption, instead opting to steal sensitive data and threaten its release unless a ransom is paid. This change reflects an adaptation to enhanced enterprise defenses, such as endpoint detection and response systems, making traditional encryption attacks more challenging.

The competitive ransomware ecosystem has also fueled innovation, with malware families that fail to stay ahead of detection mechanisms facing potential obsolescence. Attackers are increasingly turning to stealthy tactics like “living off the land” techniques, abusing legitimate administrative tools, and utilizing scripting languages such as PowerShell and JavaScript for persistence and lateral movement.

Ransomware gangs often exploit vulnerabilities in remote monitoring and management tools or utilize initial access brokers to infiltrate networks. Once inside, they escalate privileges, exfiltrate data, disable security measures, and deploy ransomware payloads. This highlights the importance of robust defenses throughout the attack chain, underscoring the need for proactive threat detection and rapid incident response to mitigate risks.

Notably, attacks frequently occur during off-hours or holidays when organizational defenses are typically weaker. Encryption typically commences during weekends or after business hours in 76% of cases, taking advantage of reduced staff availability for detection and response. These evolving tactics underscore critical gaps in organizational defenses, with data loss prevention technologies often lagging behind improvements in EDR systems.

To effectively counter these threats, organizations are advised to implement real-time monitoring, layered defenses combining EDR with network segmentation and regular patch management, and provide ongoing user education to recognize common attack vectors like phishing attempts. As ransomware gangs continue to refine their methods, comprehensive cybersecurity strategies are essential to adapt quickly to this high-speed threat landscape to avoid potentially devastating consequences.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...