• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Ransomware Gangs Adopting Business-like Practices to Boost Profits

You are here: Home / General Cyber Security News / Ransomware Gangs Adopting Business-like Practices to Boost Profits
May 30, 2023

Ransomware gangs are applying a wide range of organization-like practices to increase gains, creating it extra hard for defenders to differentiate several teams, a new report by WithSecure has surmised.  

This move towards mirroring legit organizations methods signifies that tactics, techniques and processes (TTPs) are blurring, Stephen Robinson, senior menace intelligence analyst at WithSecure explained during Sphere23.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


For illustration, although the latest tumble of ransomware gangs like Conti and Hive are constructive, much more groups have sprung up considering that then applying Conti-like TTPs. This shows that solutions utilised by these gangs are imitated and copied by other actors.

The underground market now features entities such as ransomware-as-a-company (RaaS) groups, original accessibility brokers (IAB), crypter-as-a-service (CaaS), cryptojackers, malware-as-a-provider (MaaS) teams and country-condition actors.

Robinson noted that country-states use tools available on the underground marketplace to gain accessibility to networks and systems without the need of becoming detected.

Eventually, this development towards professionalization tends to make the know-how and methods to attack organizations obtainable to lesser-proficient or badly resourced threat actors.

Read through a lot more: AI Employed to Create Malware, WithSecure Observes

Robinson mentioned IABs are industrializing exploitation although their substantial quantity of exercise.

For the duration of a presentation, Robinson highlighted an incident investigated by WithSecure, which observed that a one organization was compromised by 5 different danger actors, each and every with distinctive aims and symbolizing a diverse variety of cybercrime assistance:

• The Monti ransomware group

• Qakbot MaaS

• A cryptojacking team regarded as the 8220 Gang (also tracked as Returned Libra)

• An unnamed IAB

• A subset of Lazarus Team, an state-of-the-art persistent menace related with North Korea’s International Intelligence and Reconnaissance Standard Bureau.

Worth Breeds Demand from customers

Robinson famous that inspite of this, it is getting to be more challenging to differentiate groups. This will influence conventional detection methods and there requirements to be a new way of thinking for defenders.

“You’ve received to address them all as a related threat and you’ve obtained to be well prepared for any of them,” he informed Infosecurity. “You’ve actually received to be organized before it occurs simply because you do not really have a chance to capture up if an individual will get into your network.

“If you are a worthwhile corporation, then if an individual occurs to crack in and all they want to do is operate some crypto jacking software on your edge server, but they locate out that you happen to be a higher turnover organization of some sort, they could possibly promote that accessibility to anyone else who does want to do a little something with you.”

He observed that there has been proof of action on the dark web exactly where entities have been putting up requests for accessibility to providers with $100m turnover.

“They do not care who it is, they treatment about how valuable it is,” Robinson said.

In accordance to WithSecure’s analysis of over 3000 details leaks by multi-place extortion ransomware groups, organizations in the US had been the most prevalent victims of these attacks, followed by Canada, the UK, Germany, France and Australia.

Alongside one another, companies in these countries accounted for a few-quarters of the leaks provided in the assessment.

The building market appeared to be the most impacted and accounted for 19% of the details leaks. Automotive organizations, on the other hand, only accounted for about 6%.

A variety of other industries sat between the two owing to ransomware groups owning unique sufferer distributions, with some families focusing on a person or additional business disproportionately to many others.


Some sections of this report are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Dark Web Data Leak Exposes RaidForums Members
Next Post: Implementing Risk-Based Vulnerability Discovery and Remediation implementing risk based vulnerability discovery and remediation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.