• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

LockBit Remains Most Prolific Ransomware in Q3

You are here: Home / General Cyber Security News / LockBit Remains Most Prolific Ransomware in Q3
November 16, 2022

The notorious LockBit ransomware variant remained the most widespread in the 3rd quarter of 2022, accounting for above a fifth (22%) of detections, in accordance to a new report from Trellix.

The risk intelligence vendor analyzed proprietary details from its sensor network, open supply intelligence and investigations by the Trellix Sophisticated Investigation Middle to compile The Threat Report: Tumble 2022.

It uncovered that Lockbit and Phobos were being the most widespread ransomware households through Q3 2022. Lockbit was a short while ago assessed by Deep Instinct to be the most prolific variant of 2022 so much.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“At the finish of Q3 their ‘builder’ was unveiled, and allegedly different teams are currently creating their have RaaS with it,” the report mentioned of LockBit.

“Phobos ransomware proceeds to be energetic and accounts for 10% of our telemetry hits. Their tactic of providing a total ransomware package and averting substantial corporations allows them to stay below the radar.”

Germany recorded the best detections of APT-related activity (29%) and the greatest volume of ransomware (27%), whilst telecoms was the sector most impacted by ransomware, adopted by transportation and transport.

The latter accounted for much more APT detections than any other vertical and witnessed a 100% boost in ransomware in the US, the report claimed.

The most energetic state-of-the-art danger groups for the duration of the quarter were being the China-linked Mustang Panda, Russia’s APT29 and Pakistan-joined APT36.

Crimson team program Cobalt Strike remained a well-liked resource for threat actors, witnessed in a third (33%) of observed worldwide ransomware action and 18% of APT detections in Q3.

There was also a reminder in the report of the need to have for risk-based mostly patch management courses. Trellix noticed Microsoft Equation Editor vulnerabilities from a number of a long time ago – CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802 – as the most routinely exploited amid destructive email messages gained by customers in the quarter.

“We keep on to see unremitting action out of Russia and other point out-sponsored groups,” noted Trellix head of menace intelligence, John Fokker.

“This action, in addition a rise in politically inspired hacktivist action and sustained ransomware attacks on healthcare and training programs, indicators the require for improved inspection of cyber-risk actors and their procedures.”


Some pieces of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «how to reduce cyber security costs for your business How to reduce cyber security costs for your business
Next Post: Most Neurodiverse Women in Tech Feel Unsupported: Study Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Cybercriminals Using New ASMCrypt Malware Loader Flying Under the Radar
  • Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm
  • Post-Quantum Cryptography: Finally Real in Consumer Apps?
  • Microsoft’s AI-Powered Bing Chat Ads May Lead Users to Malware-Distributing Sites
  • Progress Software Releases Urgent Hotfixes for Multiple Security Flaws in WS_FTP Server
  • Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts
  • GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions
  • China’s BlackTech Hacking Group Exploited Routers to Target U.S. and Japanese Companies
  • The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
  • China-Linked Budworm Targeting Middle Eastern Telco and Asian Government Agencies

Copyright © TheCyberSecurity.News, All Rights Reserved.