HomeCyber BalkansRansomware groups demand payment from victims within an average of 17 hours...

Ransomware groups demand payment from victims within an average of 17 hours after breaching security

Published on

spot_img

A recent report by cybersecurity researchers revealed that attackers are shifting their tactics towards extortion, data theft, and espionage, rather than just relying on ransomware payments. The researchers found that attackers who engage in these malicious activities tend to perform more actions, such as pivoting, data harvesting, and exfiltrating, compared to those who solely rely on ransomware payments. This shift in tactics indicates a more sophisticated and targeted approach by cybercriminals.

Ransomware incidents accounted for nearly 10% of all threats detected or investigated by cybersecurity firm Huntress. The healthcare, technology, education, manufacturing, and government sectors were among the most affected industries by ransomware attacks. It is important to note that other threats tracked separately, such as malware or scripts, often serve as delivery mechanisms for ransomware or are used by initial access brokers who sell access to ransomware groups.

One notable trend identified by Huntress is the increase in the abuse of remote monitoring and management (RMM) tools by cyber attackers. Tools like ConnectWise ScreenConnect, TeamViewer, and LogMeIn have been leveraged to gain and maintain access to networks. Some ransomware groups have even exploited zero-day vulnerabilities in RMM tools to infiltrate systems and carry out their attacks.

The use of legitimate tools for malicious purposes poses a significant challenge for organizations seeking to defend against cyber threats. Attackers are adapting their techniques and exploiting vulnerabilities in commonly used software to breach networks and compromise sensitive data. This underscores the importance of implementing robust cybersecurity measures and staying vigilant against evolving threats.

As the cybersecurity landscape continues to evolve, organizations must prioritize threat detection, incident response, and proactive security measures to mitigate the risk of falling victim to ransomware attacks and other cyber threats. Collaboration with industry partners, sharing threat intelligence, and investing in employee training are essential components of a comprehensive cybersecurity strategy.

In conclusion, the findings from the report highlight the changing tactics of cyber attackers and the need for organizations to adapt their security defenses accordingly. By staying informed about emerging threats, leveraging advanced security tools, and fostering a culture of cyber awareness, businesses can enhance their resilience against ransomware and other cybersecurity risks. Vigilance and proactive defense strategies are essential in today’s threat landscape to safeguard against the ever-evolving tactics of cybercriminals.

Source link

Latest articles

Inside EkoParty Miami Featuring Federico Kirschbaum

Upcoming Live Session on Cybersecurity: Join Federico Kirschbaum for an Interactive Discussion A significant event...

Imposter Microsoft Support Website Deceives Users into Downloading Malware

Cybercriminals Target Users with Fake Microsoft Support Website Recently, a wave of cybercrime has emerged,...

TP-Link Devices Vulnerable Due to Multiple Security Flaws Allowing Takeover

Security Vulnerabilities Uncovered in TP-Link Archer AX53 Router Recent investigations by cybersecurity researchers have revealed...

Palo Alto Cortex Vulnerability in Microsoft Teams Allows Attackers to Access Data

A high-severity security vulnerability has been identified in the Microsoft Teams integration for Palo...

More like this

Inside EkoParty Miami Featuring Federico Kirschbaum

Upcoming Live Session on Cybersecurity: Join Federico Kirschbaum for an Interactive Discussion A significant event...

Imposter Microsoft Support Website Deceives Users into Downloading Malware

Cybercriminals Target Users with Fake Microsoft Support Website Recently, a wave of cybercrime has emerged,...

TP-Link Devices Vulnerable Due to Multiple Security Flaws Allowing Takeover

Security Vulnerabilities Uncovered in TP-Link Archer AX53 Router Recent investigations by cybersecurity researchers have revealed...