• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Ransomware is Being Used As a Precursor to Physical War: Ivanti

You are here: Home / General Cyber Security News / Ransomware is Being Used As a Precursor to Physical War: Ivanti
October 20, 2022

Ransomware has grown by 466% because 2019 and is more and more remaining applied as a precursor to bodily war.

The conclusions come from Ivanti’s Ransomware Index Report Q2–Q3 2022, which the company shared with Infosecurity earlier nowadays.

The knowledge also exhibits ransomware groups continuing to improve in volume and sophistication, with 35 vulnerabilities starting to be involved with ransomware in the first a few quarters of 2022 and 159 trending active exploits.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Further more, the Ivanti report highlighted 10 new ransomware households in contrast to the former quarter: Black Basta, BianLian, BlueSky, Enjoy, Hive, Deadbolt, H0lyGh0st, Lorenz, Maui and NamPoHyu. These convey the whole to 170.

From a geographical point of view, Russia has been at the forefront of the malware households found out, with 11 highly developed persistent threat (APT) groups, adopted carefully by China with eight and Iran with 4. 

According to the Ivanti report, hostile governments increasingly use condition-sponsored danger groups to infiltrate, destabilize and disrupt functions in their concentrate on countries. In quite a few of these attacks, ransomware is currently being used as a precursor to physical warfare, as shown in the new Russia–Ukraine war.

Regardless of geography, Ivanti has also explained ransomware attackers more and more depend on spear phishing procedures to entice unsuspecting victims into delivering their destructive payload, as in the circumstance of the Pegasus spy ware.

In conditions of new ransomware vulnerabilities, the cybersecurity enterprise noticed two: CVE-2021-40539 and CVE-2022-2613. Each have reportedly been exploited by ransomware households this kind of as AvosLocker and Cerbe.

The report has also revealed that 47.4% of ransomware vulnerabilities have an effect on healthcare techniques, 31.6% electricity systems and 21.1% critical producing.

“IT and security teams must urgently undertake a risk-primarily based approach to vulnerability administration to greater protect from ransomware and other threats,” explained Srinivas Mukkamala, main item officer at Ivanti.

The executive mentioned this includes leveraging automation technologies that can correlate knowledge from numerous resources but also evaluate risk, provide early warning of weaponization, forecast attacks and prioritize remediation pursuits. 

“Companies that go on to count on traditional vulnerability management techniques, these types of as entirely leveraging the [National Vulnerability Database] NVD and other general public databases to prioritize and patch vulnerabilities, will continue to be at large risk of cyber-attack,” Mukkamala concluded.

Scenario in point, it was lately unveiled that a neighborhood government authority in London had been forced to commit above £12m ($11.7m) to enable it get well from a devastating ransomware attack.


Some elements of this posting are sourced from:
www.infosecurity-journal.com

Previous Post: «google launches guac open source project to secure software supply Google Launches GUAC Open Source Project to Secure Software Supply Chain
Next Post: OldGremlin Ransomware Ups Ante Against Russian Targets Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.