Malware

Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report

I’m proud to announce the release of the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report, Enjoy it!

Ransomware has become one of the most dangerous threats for organizations worldwide. Cybercriminal organizations and ransomware gangs have devised new business models that are attracting a broad range of advanced threat actors. It is quite easy today for cybercrime groups to launch a cyber attack benefitting from the Ransomware-as-a-Service model causing damages of any size.
The ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS report aims to bring new insights into the reality of ransomware incidents through mapping and studying ransomware incidents from May 2021 to June 2022. The findings are worrisome.
Ransomware operations continue to evolve and are becoming more efficient and causing more devastating attacks. The double-extortion model could expose the most private information of targeted entities on the Internet to the highest bidder.

The main highlights of the ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS report include the following:

  • A novel LEDS matrix (Lock, Encrypt, Delete, Steal) that accurately maps ransomware capabilities based on the actions performed and assets targeted;
  • A detailed and in-depth analysis of the ransomware life cycle: initial access, execution, action on objectives, blackmail, and ransom negotiation;
  • Collection and in-depth analysis of 623 ransomware incidents from May 2021 to June 2022;
  • More than 10 terabytes of data stolen monthly by ransomware from targeted organisations;
  • Approximately 58.2% of all the stolen data contains GDPR personal data based on this analysis;
  • In 95.3% of the incidents it is not known how threat actors obtained initial access into the target organisation;
  • It is estimated that more than 60% of affected organisations may have paid ransom demands;
  • At least 47 unique ransomware threat actors were found.

Another important aspect to consider when dealing with this threat is that the number of publicly disclosed incidents is just the tip of the iceberg.

The report includes recommendations to increase resilience against ransomware attacks and respond to this threat, enjoy it!

https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, ENISA)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

RansomHub ransomware gang relies on Kaspersky TDSKiller tool to disable EDR

Researchers observed the RansomHub ransomware group using the TDSSKiller tool to disable endpoint detection and…

16 mins ago

Ivanti fixed a maximum severity flaw in its Endpoint Management software (EPM)

Ivanti fixed a maximum severity flaw in its Endpoint Management software (EPM) that can let…

4 hours ago

Microsoft Patch Tuesday security updates for September 2024 addressed four actively exploited zero-days

Microsoft Patch Tuesday security updates for September 2024 addressed 79 flaws, including four actively exploited…

6 hours ago

Quad7 botnet evolves to more stealthy tactics to evade detection

The Quad7 botnet evolves and targets new  SOHO devices, including Axentra media servers, Ruckus wireless…

17 hours ago

Poland thwarted cyberattacks that were carried out by Russia and Belarus

Poland 's security officials announced that they successfully thwarted cyberattacks that were carried out by…

1 day ago

U.S. CISA adds SonicWall SonicOS, ImageMagick and Linux Kernel bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SonicWall SonicOS, ImageMagick and Linux Kernel bugs to…

1 day ago

This website uses cookies.