{"id":23919,"date":"2024-02-12T12:10:06","date_gmt":"2024-02-12T20:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/02\/12\/news-17649\/"},"modified":"2024-02-12T12:10:06","modified_gmt":"2024-02-12T20:10:06","slug":"news-17649","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/02\/12\/news-17649\/","title":{"rendered":"Ransomware review: February 2024"},"content":{"rendered":"\n<p><em>This article is based on research by Marcelo Rivero, Malwarebytes&#8217; ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In this report, &#8220;known attacks&#8221; are those where the victim&nbsp;<strong>did not<\/strong>&nbsp;pay a ransom. This provides the best overall picture of ransomware activity, but the true number of attacks is far higher.<\/em><\/p>\n<p>In January, we recorded a total of 261 ransomware victims, the lowest number of attacks since February 2023. This is normal, as past data reveals that <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/ransomware-in-2023-recap-5-key-takeaways\" target=\"_blank\" rel=\"noreferrer noopener\">historical January months tend to be one of the least active periods for ransomware gangs<\/a>. But don\u2019t let the relatively low number of attacks fool you: there was plenty of important ransomware news last month.\u00a0<\/p>\n<p>In January, researchers observed fake &#8220;security researchers&#8221; trying to trick ransomware victims into thinking that they can recover their stolen data. Described as \u201cfollow-on extortion\u201d attacks, the goal of these scams is to get the victims to pay Bitcoin for supposed assistance.<\/p>\n<p>The two examples we have of follow-on extortion attacks targeted victims of the Royal and Akira ransomware gangs, but it\u2019s unclear if the fake security researchers are a part of either of those gangs. Our guess? It\u2019s more likely that they are a fringe group simply seizing an opportunity to exploit victims already targeted by these gangs.\u00a0<\/p>\n<p>Let\u2019s analyze why, using two scenarios, assuming that the follow-up extortioners really are Royal or Akira.\u00a0\u00a0<\/p>\n<p>In scenario one, Royal or Akira steals data, prompting a ransom payment from the victim for data deletion. Then, Royal or Akira sends a splinter group to the same victim claiming Royal didn&#8217;t delete the data, offering deletion services for an additional fee. This scenario is pretty unlikely, as it undermines Royal&#8217;s credibility from the victim&#8217;s perspective, damaging the gang&#8217;s reputation.<\/p>\n<p>In scenario two, Royal or Akira steals data, but the victim hasn&#8217;t paid for deletion yet. The Royal or Akira splinter group then offers to recover the data for a fee. This predicament forces the victim to choose who to trust, likely deciding that it might be more logical to rely on Royal since they have more incentive to maintain a semblance of reliability. So, it then just becomes a normal double-extortion case but with an unnecessary extra step.<\/p>\n<p>In the first case, the &#8220;initial ransomware gang&#8221; has no leverage for a second round of extortion without contradicting their own claims and damaging their reputation. In the second case, the initial ransomware gang just does more work to get the same outcome, namely payment for data deletion.\u00a0<\/p>\n<p>Neither option presents a guaranteed connection to the original attackers. <\/p>\n<figure class=\"wp-block-image aligncenter size-large is-resized is-style-default\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"875\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/known-ransomware-attacks-by-gang-january-2024.jpg?w=1024\" alt=\"Known ransomware attacks by gang, January 2024\" class=\"wp-image-103793\" style=\"width:700px;height:auto\" \/><figcaption class=\"wp-element-caption\">Known ransomware attacks by gang, January 2024<\/figcaption><\/figure>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"1150\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/known-ransomware-attacks-by-country-january-2024.jpg?w=1024\" alt=\"Known ransomware attacks by country, January 2024\" class=\"wp-image-103792\" style=\"width:700px\" \/><figcaption class=\"wp-element-caption\">Known ransomware attacks by country, January 2024<\/figcaption><\/figure>\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1400\" height=\"1150\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/known-ransomware-attacks-by-industry-sector-jamary-2024.jpg?w=1024\" alt=\"Known ransomware attacks by industry sector, January 2024\" class=\"wp-image-103795\" style=\"width:700px;height:auto\" \/><figcaption class=\"wp-element-caption\">Known ransomware attacks by industry sector, January 2024<\/figcaption><\/figure>\n<p>In other January news, <a href=\"https:\/\/www.ncsc.gov.uk\/report\/impact-of-ai-on-cyber-threat\" target=\"_blank\" rel=\"noreferrer noopener\">the UK&#8217;s National Cybersecurity Centre (NCSC) released a report <\/a>suggesting that AI will boost ransomware attack volume and severity in the next two years, particularly through lowering the entry barrier for novice hackers. A simple example is an affiliate using generative AI to create more persuasive phishing emails. This could decrease affiliates\u2019 dependence on Initial Access Brokers for accessing networks, leading to more attacks by individuals enticed by the lower initial investment.<\/p>\n<p>In general, however, we should be cautious about these predictions. Incorporating AI into cybercrime\u2014especially for automated discovery of vulnerabilities or efficient high-value data extraction, as NCSC\u2019s report suggests\u2014is extremely complex and costly. For major gangs like LockBit and CL0P, who manage multimillion-dollar operations, adopting these AI advancements might be more feasible, yet it is still far too early to speculate upon.<\/p>\n<p>In our view, RaaS groups will maintain their current operations in the short term. AI may introduce new methods and techniques for cybercriminals, to be sure, but the core principles of ransomware gangs\u2014based on access, leverage, and profit\u2014will likely continue unchanged for the foreseeable future.<\/p>\n<p>In other news, researchers last month witnessed Black Basta affiliates leveraging a new phishing campaign aimed at delivering a relatively new loader named PikaBot.&nbsp;<\/p>\n<p>PikaBot, an <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/08\/major-takedown-of-qakbot-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">ostensible replacement for the notorious OakBot malware<\/a>, is an initial access tool <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/12\/pikabot-distributed-via-malicious-ads\">that we first wrote about in mid-December<\/a>\u2014and it looks like it didn\u2019t take ransomware gangs long to start using it. While our original post about PikaBot focused on its distribution via malicious search ads and not phishing emails, ransomware gangs <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/malvertising-a-stealthy-precursor-to-infostealers-and-ransomware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">are known to use both attack vectors to gain initial access<\/a>.\u00a0<\/p>\n<p>A typical distribution chain for PikaBot, <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/12\/pikabot-distributed-via-malicious-ads\" target=\"_blank\" rel=\"noreferrer noopener\">writes ThreatDown Intelligence researcher J\u00e9r\u00f4me Segura<\/a>, usually starts with an email (within an already-hijacked thread) containing a link to an external website. Users are then tricked to download a zip archive containing malicious JavaScript that downloads Pikabot from an external server.\u00a0<\/p>\n<p>As this news marks the first time that PikaBot has been publicly connected with any ransomware operations, it\u2019s safe to assume that the malware is actively being used by other gangs as well\u2014or that if it&#8217;s not, it will be soon.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-new-leak-site-mydata\">New leak site: MYDATA<\/h2>\n<p>Mydata is a new leak site from Alpha ransomware, a distinct group not to be confused with ALPHV ransomware. The site published the data of 10 victims in January. <\/p>\n<h2 class=\"wp-block-heading\" id=\"h-preventing-ransomware\">Preventing Ransomware<\/h2>\n<p>Fighting off ransomware gangs like the ones we report on each month requires a layered security strategy. Technology that preemptively keeps gangs out of your systems is great\u2014but it\u2019s not enough.&nbsp;<\/p>\n<p>Ransomware attackers target the easiest entry points: an example chain might be that they first try phishing emails, then open RDP ports, and if those are secured, they\u2019ll exploit unpatched vulnerabilities. Multi-layered security is about making infiltration progressively harder and detecting those who do get through.&nbsp;<\/p>\n<p>Technologies like Endpoint Protection (EP) and Vulnerability and Patch Management (VPM) are vital first defenses, reducing breach likelihood.&nbsp;<\/p>\n<p>The key point, though, is to assume that motivated gangs will eventually breach defenses. Endpoint Detection and Response (EDR) is crucial for finding and removing threats before damage occurs. And if a breach does happen\u2014ransomware rollback tools can undo changes.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-threatdown-addresses-ransomware\"><strong>How ThreatDown Addresses Ransomware<\/strong><\/h2>\n<p>ThreatDown bundles take a comprehensive approach to these challenges. Our integrated solutions combine EP, VPM, and EDR technologies, tailored to your organization\u2019s specific needs. ThreatDown\u2019s select bundles offer:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/how-it-teams-can-prevent-phishing-attacks-with-malwarebytes-dns-filtering\">Advanced Web Protection<\/a>: Blocking phishing websites ransomware gangs use for initial access.<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/04\/port-scan-attacks-protecting-your-business-from-rdp-attacks-and-mirai-botnets\">RDP Shield:<\/a>&nbsp;Securing remote access points with Brute Force Protection.<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/vulnerability-response-for-smbs-the-malwarebytes-approach\">Continuous Vulnerability Scanning and Patch Management<\/a>: Identifying and patching weaknesses before ransomware gangs can exploit them.<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/07\/demo-your-data-has-been-encrypted-stopping-ransomware-attacks-with-malwarebytes-edr\">Sophisticated EDR<\/a>: Detecting and neutralizing advanced threats such as LockBit within the network.<\/li>\n<li><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/08\/faq-how-does-malwarebytes-ransomware-rollback-work\">Ransomware Rollback<\/a>: Reversing the impact of any successful attacks.<\/li>\n<\/ul>\n<figure class=\"wp-block-image aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1094\" height=\"247\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/12\/7225d66b-875a-4784-be43-d4cb54b0c5b2.png?w=1024\" alt=\"ransomware 1\" class=\"wp-image-100612\" \/><\/figure>\n<p class=\"has-text-align-center\">ThreatDown EDR detecting LockBit ransomware<\/p>\n<figure class=\"wp-block-image aligncenter\"><img decoding=\"async\" loading=\"lazy\" width=\"359\" height=\"277\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/12\/dc03e31c-b8c6-46a8-8f57-0b51963f42e7-1.png\" alt=\"\" class=\"wp-image-100613\" \/><\/figure>\n<p class=\"has-text-align-center\">ThreatDown automatically quarantining LockBit ransomware<\/p>\n<p>For resource-constrained organizations, select ThreatDown bundles offer Managed Detection and Response (MDR) services, providing expert monitoring and swift threat response to ransomware threats\u2014without the need for large in-house cybersecurity teams.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Our business solutions remove all remnants of ransomware and prevent you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-371336e6-815b-4134-8818-f944dbc308bb\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2024\/02\/ransomware-review-february-2024\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In January, we recorded a total of 261 ransomware victims. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[3765,12040],"class_list":["post-23919","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ransomware","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23919"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23919\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23919"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}