Last six months, number of ransomware variants doubled

Cyber security company Fortinet, last week published its semi-annual FortiGuard Labs Global Threat Landscape Report. Research findings covered in the report for the first half of 2022 include:

  • More and more ransomware variants are popping up as a result of the popularity of Ransomware-as-a-Service (RaaS) on the darkweb.
  • Cybercriminals continue to target the endpoints of mobile and home workers to gain access to corporate networks. Operational technology (OT) and information technology (IT) environments are attractive targets for cybercriminals looking to take advantage of the growing attack surface and convergence between IT and OT.
  • The arsenal of cybercriminals is complemented by increasingly devastating cyber threats, as evidenced by the wide spread of wiper malware.
  • Cybercriminals are embracing techniques for conducting reconnaissance and bypassing security mechanisms in order to act more accurately and turn their target's processes and systems into weapons.
  • Endpoints remain a prime target of cybercriminals due to the continuing trend of ‘work from anywhere’

Growth of ransomware variants points to development of criminal ecosystems

Ransomware remains one of the most important threats. Cybercriminals are investing plenty of time and money in it. FortiGuard Labs observed a total of 10,666 ransomware variants in the past six months. In the previous six months, the figure was only 5,400. This represents a growth of nearly 100% in the number of ransomware variants in six months. RaaS, because of its popularity on the dark web, remains a key growth driver behind a cybercriminal industry that forces organizations to pay ransom. Companies of all sizes and in every industry must take a proactive approach to cybersecurity to protect against ransomware. This requires real-time visibility, protection and remediation combined with zero trust network access (ZTNA) and advanced endpoint detection & response (EDR) functionality.

OT and endpoints remain popular targets

The convergence of IT and OT and endpoints deployed for work from anywhere provide cybercriminals with plenty of opportunities to target the growing attack surface. They often exploit vulnerabilities on endpoints to penetrate corporate networks. Popular techniques included abuse of a spoofing vulnerability (CVE 2022-26925) and a vulnerability that allowed remote execution of malicious code (CVE 2022-26937). An analysis of the number of vulnerabilities on endpoints and the number of malware detections shows that cybercriminals know how to take full advantage of both old and new vulnerabilities to gain access to networks. They are also gratefully exploiting vulnerabilities within OT systems. This is due to the convergence of IT and OT environments and the fact that cybercriminals such as state hackers can cause great damage with OT attacks. Advanced endpoint security solutions can reduce the number of cyber attacks and contribute to more effective recovery of infected devices at an early stage of attack. Organizations can also turn to services such as a digital risk protection service (DRPS) to expose vulnerabilities in their infrastructure and receive contextual information that gives them insight into current and future threats.

Devastating attacks with wiper malware grow in number

Trends in wiper malware point to the worrying rise of even more devastating and sophisticated attack techniques that involve wiping the victim's data. The war in Ukraine sparked a surge in disk wiping malware. Attacks with these were primarily targeted at critical infrastructures. FortiGuard Labs identified seven major new wiper variants in the first months of 2022. These were used in various attacks against government agencies, military organizations and businesses. Attacks with wiper malware were not limited to one geographic region. They were detected in 24 other countries besides Ukraine. Minimizing the impact of these types of attacks requires boosting detection capabilities by combining network detection & response (NDR) functionality with self-learning artificial intelligence. In addition, it is critical to store backups in a remote offline location.

Bypassing security mechanisms remains the main attack tactic

An analysis of the various strategies employed by cybercriminals sheds light on the evolution of attack techniques. FortiGuard Labs analyzed the operation of detected malware to determine which techniques were used most frequently over the past six months. Bypassing security mechanisms preach at the top of the list of most used tactics by malware developers. They try to circumvent security mechanisms by disguising their attack techniques. For example, they use a bona fide certificate to abuse trusted processes. The second most popular technique was process injection. Here, cybercriminals inject code into the address space of a process to bypass security mechanisms and go about their business unseen.

Organizations can provide more effective protection against the vast arsenal of cybercriminals if they have practically deployable threat intelligence. Integrated, AI and machine learning-driven security platforms with advanced detection and incident response functionality powered by real-time threat intelligence are indispensable to provide protection for all edges of hybrid networks.

AI-assisted protection of the entire attack surface

Organizations that analyze threat intelligence to gain deep insight into cybercriminals' targets and tactics will be better able to adapt their security mechanisms and respond quickly and proactively to new attack techniques. Knowledge of the latest cyber threats is critical to prioritize vulnerability patching and protect IT and OT environments more effectively. Security awareness training is also important to keep employees and security teams abreast of the changing threat landscape. Organizations also need security processes that can nip in the bud the large number of sophisticated and dynamic modern cyber threats at the speed of the network. A security strategy supported by AI and ML that provides detection, prevention and incident response and is based on a mesh architecture offers the possibility of much tighter integration, more intensive automation and faster, coordinated and effective response to cyber threats across the network with all its ramifications.

About the Global Threat Landscape Report

This new edition of the Global Threat Landscape Report reflects the collective knowledge of FortiGuard Labs. It is based on information on billions of security incidents collected through Fortinet's global sensor network in the second half of 2022. The MITRE ATT&CK framework divides cybercriminals' attack techniques into three categories: explorebuilding a presence and the first entry. The FortiGuard Labs Global Threat Landscape Report uses this model to describe how cybercriminals find vulnerabilities, set up a malicious infrastructure and exploit vulnerabilities within their target's systems. The report provides both global and regional perspectives and addresses cyber threats that target IT and OT environments.

Vincent Zeebregts, Regional Director of the Netherlands

“Cybercriminals are adopting increasingly clever ways to circumvent security mechanisms and are further expanding their network of criminal partners. They proceed extremely aggressively and do not shy away from extortion or erasing their victims” data. Leading up to their attacks, they conduct extensive reconnaissance of their target's network to achieve maximum results. To counter sophisticated attacks, organizations need integrated security solutions fed with real-time threat intelligence. These solutions must be able to detect threat patterns and contrast vast amounts of data to identify anomalous activity and automatically trigger coordinated countermeasures within hybrid networks." You can view or download the full analysis of the study below.

The report is available at this link Report 2022 H 1 Threat Landscape.

Thanks to cybercrimeinfo's blog: Last six months, number of ransomware variants doubled (cybercrimeinfo.co.uk)

Recent blogs

kwantumcomputers
Blog
What are quantum computers? And why is everyone suddenly talking about them?
Chances are you've been hearing more and more about quantum computers in recent months. In the news, on LinkedIn, or perhaps even during conversations about AI and cybersecurity. Especially now that a Dutch chip developer is gaining global attention with a new generation of quantum chips, the technology suddenly seems closer than ever. But what exactly is a quantum computer? And why is so much expected of it? From Ordinary Computer to Quantum Computer To understand quantum computers, it's helpful to first look at how a normal computer works. A traditional computer — like your laptop or server — works with bits. A…
frankberry
Blog
With our feet in the mud
Here we are. Not quite recognizable anymore, thanks to AI trying to protect children. Understandable, of course. But believe us: these really are Berry and Frank. More than ten years apart, but in reality, we've always been brothers from another mother. And what do we have in common? A lot... and at the same time, almost nothing. Berry is often the good cop. Calm, down-to-earth, and always working to get things done. I'm usually the bad cop. Direct, critical, and always looking for ways to improve. But that combination is precisely what works. What completely unites us, though, is our love for...
Macadmins Leiden
Blog
MacAdmins Meeting: What's relevant for your organization?
Last week, we attended the MacAdmins Meeting in Leiden. It's a gathering focused on Apple administration, security, and innovation. What stood out? Developments are moving fast. But more importantly: they are becoming increasingly relevant for SMEs. We'd like to share the key insights with you. What's happening? And what does that mean for your organization? Running AI Locally: Control Over Data and Costs AI is now everywhere. But one question remains central: where does your data reside? A significant topic during the meeting was running AI models (LLMs) locally. Instead of relying on external cloud platforms, more and more...

A newsletter

Superlogic right?