• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Ransomware is Being Used As a Precursor to Physical War: Ivanti

You are here: Home / General Cyber Security News / Ransomware is Being Used As a Precursor to Physical War: Ivanti
October 20, 2022

Ransomware has grown by 466% because 2019 and is more and more remaining applied as a precursor to bodily war.

The conclusions come from Ivanti’s Ransomware Index Report Q2–Q3 2022, which the company shared with Infosecurity earlier nowadays.

The knowledge also exhibits ransomware groups continuing to improve in volume and sophistication, with 35 vulnerabilities starting to be involved with ransomware in the first a few quarters of 2022 and 159 trending active exploits.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Further more, the Ivanti report highlighted 10 new ransomware households in contrast to the former quarter: Black Basta, BianLian, BlueSky, Enjoy, Hive, Deadbolt, H0lyGh0st, Lorenz, Maui and NamPoHyu. These convey the whole to 170.

From a geographical point of view, Russia has been at the forefront of the malware households found out, with 11 highly developed persistent threat (APT) groups, adopted carefully by China with eight and Iran with 4. 

According to the Ivanti report, hostile governments increasingly use condition-sponsored danger groups to infiltrate, destabilize and disrupt functions in their concentrate on countries. In quite a few of these attacks, ransomware is currently being used as a precursor to physical warfare, as shown in the new Russia–Ukraine war.

Regardless of geography, Ivanti has also explained ransomware attackers more and more depend on spear phishing procedures to entice unsuspecting victims into delivering their destructive payload, as in the circumstance of the Pegasus spy ware.

In conditions of new ransomware vulnerabilities, the cybersecurity enterprise noticed two: CVE-2021-40539 and CVE-2022-2613. Each have reportedly been exploited by ransomware households this kind of as AvosLocker and Cerbe.

The report has also revealed that 47.4% of ransomware vulnerabilities have an effect on healthcare techniques, 31.6% electricity systems and 21.1% critical producing.

“IT and security teams must urgently undertake a risk-primarily based approach to vulnerability administration to greater protect from ransomware and other threats,” explained Srinivas Mukkamala, main item officer at Ivanti.

The executive mentioned this includes leveraging automation technologies that can correlate knowledge from numerous resources but also evaluate risk, provide early warning of weaponization, forecast attacks and prioritize remediation pursuits. 

“Companies that go on to count on traditional vulnerability management techniques, these types of as entirely leveraging the [National Vulnerability Database] NVD and other general public databases to prioritize and patch vulnerabilities, will continue to be at large risk of cyber-attack,” Mukkamala concluded.

Scenario in point, it was lately unveiled that a neighborhood government authority in London had been forced to commit above £12m ($11.7m) to enable it get well from a devastating ransomware attack.


Some elements of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «google launches guac open source project to secure software supply Google Launches GUAC Open Source Project to Secure Software Supply Chain
Next Post: OldGremlin Ransomware Ups Ante Against Russian Targets Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.