• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Ransomware Attacks Adapt With New Techniques: Kaspersky Report

You are here: Home / General Cyber Security News / Ransomware Attacks Adapt With New Techniques: Kaspersky Report
May 11, 2023

Attackers are using more subtle ransomware attack strategies and incorporating critical characteristics from defunct legal teams to concentrate on men and women, in accordance to the hottest report from Kaspersky.

The improvements underscore evolving concerns in the cybersecurity landscape.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The report, New ransomware tendencies in 2023, was revealed currently in advance of Anti-Ransomware Day 2023 on Friday.

In accordance to the report, the top rated five ransomware groups that have the most impression and generate the most attacks have undergone sizeable alterations in the previous 12 months.

In the initial fifty percent of 2022, REvil and Conti were ranked second and third respectively, in conditions of attacks. Nonetheless, in Q1 2023, these groups ended up changed by Vice Society and BlackCat. The remaining ransomware groups in the best five for Q1 2023 are Clop and Royal.

Browse a lot more on Vice Modern society risk actors: Vice Culture Statements Ransomware Attack In opposition to University of Duisburg-Essen

Kaspersky additional that, in accordance to their review of last year’s ransomware traits, all of these groups persisted. The researchers have taken observe of some considerable cross-system ransomware versions, these kinds of as Luna and Black Basta.

As for 2023, Kaspersky industry experts highlighted three essential ransomware developments. To start with, ransomware groups are incorporating self-spreading features or imitations into their malware, as found with examples like Black Basta, LockBit and Participate in.

Secondly, cybercriminals are exploiting vulnerabilities in antivirus motorists, even concentrating on industries like gaming. 

Finally, huge ransomware gangs are adopting abilities from leaked or acquired code, strengthening their offensive capabilities.

“Ransomware gangs constantly shock us and never ever stop developing their methods and strategies,” stated Dmitry Galov, a senior security researcher at Kaspersky’s Worldwide Analysis and Investigation Staff.

Further, about the previous 18 months, the government said the corporation noticed that ransomware gangs are transitioning their operations into completely-fledged companies.

“This simple fact helps make even amateur attackers quite dangerous. So, to make your small business and your own details safe, it is very crucial to hold your cybersecurity solutions current,” Gavlov concluded.

A lot more information and facts about ransomware trends in 2023 is offered in this assessment by Recorded Long term CISO, Jason Steer.


Some sections of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News “Greatness” Phishing Tool Exploits Microsoft 365 Credentials
Next Post: Threat Actors Use Babuk Code to Build Hypervisor Ransomware Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.