{"id":23899,"date":"2024-02-09T09:10:14","date_gmt":"2024-02-09T17:10:14","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/02\/09\/news-17629\/"},"modified":"2024-02-09T09:10:14","modified_gmt":"2024-02-09T17:10:14","slug":"news-17629","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/09\/news-17629\/","title":{"rendered":"Ransomware in 2023 recap: 5 key takeaways"},"content":{"rendered":"\n<p><em>This article is based on research by Marcelo Rivero, Malwarebytes\u2019 ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, \u201cknown attacks\u201d are those where the victim did not pay a ransom. This provides the best overall picture of ransomware activity, but the true number of attacks is far higher.<\/em><\/p>\n<p>2023 was an explosive year for ransomware.<\/p>\n<p>While some ransomware trends hardly changed over the last year, such as LockBit&#8217;s continued dominance, ransomware criminals also challenged our fundamental assumptions on how ransomware gangs work, such as by exploiting zero-day vulnerabilities. Through thec onsistenciess and evolutions over the last year, one fact remains clear: 2023 broke records <strong>with its total number of 4475 ransomware attacks, a 70% increase from 2022.<\/strong><\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1520\" height=\"934\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/Screenshot-2024-01-30-at-11.24.39\u202fAM.png?w=1024\" alt=\"\" class=\"wp-image-103162\" \/><\/figure>\n<p class=\"has-text-align-center\">Global ransomware attacks by month, 2022 vs 2023<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1110\" height=\"670\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/Screenshot-2024-01-30-at-12.59.44\u202fPM.png?w=1024\" alt=\"\" class=\"wp-image-103171\" \/><\/figure>\n<p class=\"has-text-align-center\">Global ransomware attacks, 2022 vs 2023<\/p>\n<p>Additionally, LockBit was responsible for a <strong>22% of all ransomware attacks in 2023<\/strong>, over half as much as the next top five gangs combined. Together, the top 10 ransomware gangs were responsible for <strong>70% of all ransomware attacks<\/strong>.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1472\" height=\"932\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/Screenshot-2024-01-30-at-11.26.21\u202fAM.png?w=1024\" alt=\"\" class=\"wp-image-103164\" \/><\/figure>\n<p class=\"has-text-align-center\">Top 10 ransomware gangs in 2023<\/p>\n<p>Breaking 2023 ransomware attacks by sector reveals that<strong> 23% of all attack<\/strong>s were directed against the Services sector. Together, the top 10 sectors accounted for <strong>80% of all ransomware attacks<\/strong>.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1520\" height=\"936\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/Screenshot-2024-01-30-at-11.25.12\u202fAM.png?w=1024\" alt=\"\" class=\"wp-image-103165\" \/><\/figure>\n<p class=\"has-text-align-center\">Top 10 industries attacked 2023<\/p>\n<p>The USA was by far the most attacked country in 2023, <strong>with a whopping 45%<\/strong> of all ransomware attacks targeting the country. <\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1438\" height=\"892\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/01\/Screenshot-2024-01-30-at-12.28.58\u202fPM.png?w=1024\" alt=\"\" class=\"wp-image-103169\" \/><\/figure>\n<p class=\"has-text-align-center\">Top 10 countries attacked 2023<\/p>\n<p>Additionally, we&#8217;ve sifted through the backlog of our 2023 ransomware reviews to find the most important stories and trends from the last year. Here are five key takeaways from the ransomware world in 2023.<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-1-lockbit-was-lockbit\">1. LockBit was&#8230; LockBit<\/h3>\n<p>LockBit remained the most prolific ransomware gang throughout 2023, responsible for several high-profile attacks (such as against Taiwanese chipmaker TSMC). As well, LockBit also unveiled a new variant, <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/02\/ransomware-in-february-2023\" target=\"_blank\" rel=\"noreferrer noopener\">LockBit Green<\/a>, and showed signs of expanding into <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/ransomware-review-may-2023\" target=\"_blank\" rel=\"noreferrer noopener\">macOS territory<\/a>.&nbsp;&nbsp;<\/p>\n<h3 class=\"wp-block-heading\" id=\"h-2-law-enforcement-worked-overtime\">2. Law enforcement worked overtime<\/h3>\n<p>Despite 2023 being the worst ransomware year on record, law enforcement notched notable successes in taking down big-name groups, including the <a href=\"http:\/\/2\">FBI&#8217;s shutdown of the Hive ransomware grou<\/a><a href=\"http:\/\/2https:\/\/www.malwarebytes.com\/blog\/business\/2023\/02\/ransomware-in-february-2023\">p<\/a> and the seizure of <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/01\/ransomware-review-january-2024\">ALPHV&#8217;s infrastructure<\/a>. <\/p>\n<h3 class=\"wp-block-heading\" id=\"h-3-gangs-seized-the-day-with-zero-days\">3. Gangs seized the day with zero-days<\/h3>\n<p>Ransomware gangs, including Cl0p and ALPHV, aggressively exploited zero-day vulnerabilities (e.g., in <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/04\/ransomware-review-april-2023\">GoAnywhere MFT<\/a>, <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/ransomware-review-july-2023\">MOVEit Transfer<\/a>, and<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/12\/ransomware-review-december-2023\"> Citrix appliances<\/a>) to launch attacks on a unprecedented scale. <\/p>\n<h3 class=\"wp-block-heading\" id=\"h-4-big-blows-dealt-to-critical-infrastructure\">4. Big blows dealt to critical infrastructure <\/h3>\n<p>Critical infrastructure (<a href=\"https:\/\/www.cisa.gov\/topics\/critical-infrastructure-security-and-resilience\/critical-infrastructure-sectors\">as defined by CISA<\/a>) took a beating in 2023, with sectors such as logistics, manufacturing, healthcare, and education accounting for almost<strong> 30% of all ransomware attacks<\/strong> in 2023. Education alone (a subsector of the Government Facilities sector)<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/01\/2024-state-of-ransomware-in-education-92-spike-in-k-12-attacks\"> experienced a 70% surge in attacks<\/a> in the past year, increasing from 129 incidents in 2022 to 265 in 2023. <\/p>\n<h3 class=\"wp-block-heading\" id=\"h-5-new-tactics-and-rebrandings-emerged\">5. New tactics and rebrandings emerged<\/h3>\n<p>Besides an increased focus on exploiting zero-days, ransomware gangs introduced other new tactics in 2023 <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ransomware-review-september-2023\">such as CL0P&#8217;s use of torrents for distributing stolen data<\/a> and innovative social engineering techniques by <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/ransomware-review-october-2023\">groups like Scattered Spider.<\/a> We also saw notable rebrands (i.e <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/12\/ransomware-review-december-2023\">Vice Society to Rhysida<\/a>) and shifts in focus from encryption to <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/ransomware-review-august-2023\">purely data theft <\/a>and <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/04\/ransomware-review-april-2023\">extortion<\/a>. <\/p>\n<h2 class=\"wp-block-heading\" id=\"h-looking-ahead\">Looking ahead<\/h2>\n<p>2023 was a whirlwind year for ransomware: Attacks spiked by 70%, law enforcement landed key victories, gangs pivoted to exploiting zero-day vulnerabilities, and much more.<\/p>\n<p>Going into 2024 it&#8217;s safe to say that the threat of ransomware looms large for all organizations\u2014especially those with shrinking security budgets and overtaxed IT teams, organizations located in the US, critical infrastructure sectors like education.<\/p>\n<p>Fighting off ransomware gangs requires a layered security strategy. Technologies such as Endpoint Protection (EP) and Vulnerability and Patch Management (VPM), for example, are vital first defenses to reduce the attack surface breach likelihood.<\/p>\n<p>The key point, though, is to assume that motivated gangs will eventually breach any defenses. Endpoint Detection and Response (EDR) is crucial for finding and removing threats before damage occurs. And for the ultimate assurance of uptime \u2014choose an EDR solution with ransomware rollback to undo changes and restore files so that productivity continues.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-threatdown-addresses-ransomware\">How ThreatDown Addresses Ransomware<\/h2>\n<p>ThreatDown Bundles take a comprehensive approach to ransomware. Our integrated solutions combine EP, VPM, and EDR technologies, tailored to your organization\u2019s specific needs, including:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/how-it-teams-can-prevent-phishing-attacks-with-malwarebytes-dns-filtering\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Web Protection<\/a>: Blocking phishing websites ransomware gangs use for initial access.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/04\/port-scan-attacks-protecting-your-business-from-rdp-attacks-and-mirai-botnets\" target=\"_blank\" rel=\"noreferrer noopener\">RDP Shield:<\/a>&nbsp;Securing remote access points with Brute Force Protection.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/vulnerability-response-for-smbs-the-malwarebytes-approach\" target=\"_blank\" rel=\"noreferrer noopener\">Continuous Vulnerability Scanning and Patch Management<\/a>: Identifying and patching weaknesses before ransomware gangs can exploit them.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/07\/demo-your-data-has-been-encrypted-stopping-ransomware-attacks-with-malwarebytes-edr\" target=\"_blank\" rel=\"noreferrer noopener\">Sophisticated EDR<\/a>: Detecting and neutralizing advanced threats such as LockBit within the network.&nbsp;<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/08\/faq-how-does-malwarebytes-ransomware-rollback-work\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware Rollback<\/a>: Reversing the impact of any successful attacks.&nbsp;<\/li>\n<\/ul>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"359\" height=\"277\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/12\/dc03e31c-b8c6-46a8-8f57-0b51963f42e7-1.png?w=359\" alt=\"\" class=\"wp-image-100613\" \/><\/figure>\n<p class=\"has-text-align-center\">ThreatDown EDR detecting LockBit ransomware<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1094\" height=\"247\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/12\/7225d66b-875a-4784-be43-d4cb54b0c5b2.png?w=1024\" alt=\"ransomware 1\" class=\"wp-image-100612\" \/><\/figure>\n<p class=\"has-text-align-center\">ThreatDown automatically quarantining LockBit ransomware<\/p>\n<p>For resource-constrained organizations, select ThreatDown bundles offer Managed Detection and Response (MDR) services, providing expert monitoring and swift threat response to ransomware attacks\u2014without the need for large in-house cybersecurity teams.<\/p>\n<p class=\"has-text-align-center\"><a class=\"wp-block-button__link has-white-color has-dark-blue-background-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.threatdown.com\/pricing\/\"><strong>Experience ThreatDown Bundles<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/ransomware-in-2023-recap-5-key-takeaways\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 2023 saw a 70% increase in ransomware attacks from 2022. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[12040],"class_list":["post-23899","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23899"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23899\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23899"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}