Ransomware payments hit new records in 2021 as cybercriminals increasingly turned to Dark Web “leak sites” where they pressured victims to pay up, according to research released by cybersecurity solutions firm Palo Alto Networks.
The average ransom demand in cases worked by Palo Alto Networks’ threat research arm Unit 42 rose by 144% in 2021 to $2.2 million, while the average payment climbed 78% to $541,010. The most affected industries were professional and legal services, construction, wholesale and retail, healthcare, and manufacturing.
“In 2021, ransomware attacks interfered with everyday activities that people all over the world take for granted — everything from buying groceries, purchasing gasoline for our cars to calling 911 in the event of an emergency and obtaining medical care,” said Jen Miller-Osborn, deputy director, Unit 42 Threat Intelligence.
Cybersecurity now a priority among business leaders — Palo Alto Networks
Palo Alto Networks’ supply chain security solutions provide threat visibility
REvil
The Conti ransomware group was responsible for the most activity, accounting for more than 1 in 5 cases worked by Unit 42 consultants in 2021. REvil, also known as Sodinokibi, was No. 2 at 7.1%, followed by Hello Kitty and Phobos (4.8% each). Conti also posted the names of 511 organizations on its Dark Web leak site, the most of any group.
The report describes how the cyber extortion ecosystem grew in 2021, with the emergence of 35 new ransomware gangs. It documents how criminal enterprises invested windfall profits into creating easy-to-use tools in attacks that increasingly leverage zero-day vulnerabilities.
The number of victims whose data was posted on leak sites rose 85% in 2021, to 2,566 organizations, according to Unit 42’s analysis. 60% of leak site victims were in the Americas, followed by 31% for Europe, the Middle East, and Africa, and then 9% in the Asia-Pacific region.
Categories: Uncategorized