Site icon Back End News

Kaspersky trends report shows evolution of ransomware groups

Cybersecurity

Ransomware groups are showing massive sophistication in terms of attacks and the way they operate. This is one of the significant findings highlighted in cybersecurity solutions firm Kaspersky’s report covering new ransomware trends spotted in 2022.

Advancements in technology and geopolitical situations are factors that contributed to how ransomware groups evolved their attacks, which cut across all sectors, large or small in size.

“If last year we said ransomware is flourishing, this year it’s in full bloom. Although major ransomware groups from last year were forced to quit, new actors have popped up with never before seen techniques,” said Dmitry Galov, senior security researcher at Kaspersky’s Global Research and Analysis Team, in a media release. “Nevertheless, as ransomware threats evolve and expand, both technologically and geographically, they become more predictable, which helps us to better detect and defend against them.”

Kaspersky shares how scammers dupe mobile users into unwanted paid services
Older consumers worry about using digital payments — Kaspersky study

Trends

  1. Prolific use of cross-platform

Recognizing that people are present on many platforms, ransomware groups try to damage as many systems as possible using the same malware. They write codes that can be executed on several operating systems at once. Kaspersky found that Conti, one of the most active ransomware groups, has developed a variant, which is distributed through selected affiliates and targets Linux.

“In late 2021, Rust and Golang, cross-platform programming languages, became more widespread,” Kaspersky said. “BlackCat, a self-proclaimed ‘next-generation’ malware gang that has reportedly attacked more than 60 organizations since December 2021, wrote its malware in Rust. Golang was used in ransomware by DeadBolt, a group infamous for its attacks on QNAP.”

  1. Rebranding to evade detection

Because some groups have been shutdown, some ransomware groups rebrand so they can continue with their activities. Some groups developed and implemented complete toolkits that resembled ones from benign software companies.

“Lockbit stands out as a remarkable example of a ransomware gang’s evolution,” Kaspersky explained. “The organization boasts an array of improvements compared to its rivals, including regular updates and repairs to its infrastructure. It also first introduced StealBIT, a custom ransomware exfiltration tool that enables data exfiltration at the highest speeds ever – a sign of the group’s hard work put towards malware acceleration processes.

  1. Politically motivated attacks

Kaspersky experts have witnessed that the conflict in Ukraine has heavily impacted the ransomware landscape. Although such attacks are usually associated with advanced persistent threat (APT) actors, Kaspersky detected some major activities on cybercrime forums and actions by ransomware groups in response to the situation.

Shortly after the conflict began, ransomware groups took sides, which led to politically motivated attacks by some ransomware gangs in support of Russia or Ukraine. One of the malware that was freshly discovered during the conflict is the Freeud, developed by the Ukrainian supporters. Freeud features wiping functionality. If the malware contains a list of files, instead of encrypting, the malware wipes them from the system.

Kaspersky encourages organizations to follow these best practices that help safeguard your organization against ransomware:

Exit mobile version