• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
the drop in ransomware attacks in 2024 and what it

The Drop in Ransomware Attacks in 2024 and What it Means

You are here: Home / General Cyber Security News / The Drop in Ransomware Attacks in 2024 and What it Means
April 8, 2024

The ransomware field surged in 2023 as it saw an alarming 55.5% enhance in victims around the world, achieving a staggering 5,070. But 2024 is starting up off exhibiting a very different photograph. When the figures skyrocketed in Q4 2023 with 1309 conditions, in Q1 2024, the ransomware marketplace was down to 1,048 situations. This is a 22% minimize in ransomware attacks as opposed to Q4 2023.

Ransomware AttacksDetermine 1: Victims for each quarter

There could be a number of motives for this sizeable fall.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Rationale 1: The Legislation Enforcement Intervention

To start with, legislation enforcement has upped the ante in 2024 with actions against the two LockBit and ALPHV.

The LockBit Arrests

In February, an international operation named “Procedure Cronos” culminated in the arrest of at the very least three associates of the notorious LockBit ransomware syndicate in Poland and Ukraine.

Regulation enforcement from multiple countries collaborated to consider down LockBit’s infrastructure. This included seizing their dark web domains and attaining entry to their backend units. Authorities seized cryptocurrency accounts and attained decryption keys to support victims recover data. They also utilized Lockbit’s own web page to release internal details about the team alone.

Ukrainian cyber police disclosed that they had detained a “father and son” duo allegedly affiliated with LockBit, whose things to do purportedly impacted individuals, corporations, governmental entities, and health care institutions in France.

During searches of the suspects’ residences in Ternopil, Ukraine, law enforcement seized cell phones and computer system devices suspected to have been utilized in cyberattacks.

In Poland, authorities arrested a 38-yr-old unique in Warsaw, suspected of being related with LockBit. He was introduced right before the prosecutor’s office and billed with criminal offenses.

Having said that, LockBit re-emerged within just a 7 days, highlighting the ongoing issues of combating cybercrime.

They introduced a statement on Tox.

“ФБР уебали сервера через PHP, резервные сервера без PHP не тронуты”

“The FBI fu$%#d up servers utilizing PHP, backup servers without having PHP are not touched”

Soon immediately after the group continued its world onslaught versus corporations, preserving its situation as a dominant pressure in the realm of ransomware functions. This resilience underscores the group’s formidable electric power and capabilities, as well as the sturdy security actions bordering its operations that guarantees its ongoing viability and probably promising long run, as evidenced by quarterly traits over new a long time.

The Influence of the ALPHV Takedown

In a main blow to the ransomware business, the FBI introduced on December 19th, 2023, that they had disrupted the ALPHV/BlackCat ransomware team. This takedown adopted a five-working day outage of the group’s dark web infrastructure, which started on December 8th. The FBI seized control of just one of ALPHV’s principal web pages, changing it with their signature banner. This motion, alongside with the improvement of a decryption instrument to help victims, represents a major win for legislation enforcement in the combat from ransomware.

In Q1 2024, ALPHV had been powering 51 ransomware attacks, a major fall from the 109 attacks in Q4 2023. Whilst the team is still active in 2024, the FBI takedown evidently had a considerable impression.

Rationale 2: The Lower in Ransom Payments

The lessen in ransom payments could also be prompting ransomware teams to retire and request substitute sources of income.

In the previous quarter of 2023, the proportion of ransomware victims complying with ransom needs plummeted to a historic reduced of 29%, as for every info from ransomware negotiation business Coveware.

Coveware characteristics this steady drop to many components, like enhanced preparedness between companies, skepticism towards cybercriminals’ assurances to not disclose pilfered information, and lawful constraints in regions in which ransom payments are prohibited.

Not only has there been a minimize in the range of ransomware victims generating payments, but there has also been a noteworthy decrease in the financial benefit of these kinds of payments.

Coveware notes that in Q4 2023, the ordinary ransom payment amounted to $568,705, marking a 33% decrease from the previous quarter, with the median ransom payment standing at $200,000.

New Groups Emerging BUT Not Yet Masking the Fall

In spite of the fall in a selection of attacks from Q4 2023 to Q1 2024 and even with the lessen profitability, numerous new ransomware groups emerged in Q1. New teams include:

  • RansomHub – figuring out by itself as a global crew of hackers generally enthusiastic by money obtain.
  • Trisec – who openly diverges from standard ransomware teams by openly aligning itself with a nation-condition.
  • Slug – who assert responsibility for infiltrating and concentrating on AerCap
  • Mydata- with a facts leak internet site naming many popular businesses, which includes the Accolade Group, Gadot Biochemical industries, and far more.

Cyberint anticipates many of these newer groups to greatly enhance their capabilities and emerge as dominant gamers in the marketplace, alongside veteran groups like LockBit 3., Cl0p, and BlackBasta.

Go through Cyberint’s 2023 Ransomware Report for extra emerging groups, the leading focused industries and countries, a breakdown of the best 3 ransomware teams energetic in Q1 2024, notable 2024 traits & incidents and much more.

Browse the Report.

Discovered this posting fascinating? This write-up is a contributed piece from one particular of our valued partners. Follow us on Twitter  and LinkedIn to browse extra exceptional material we article.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «cybercriminals targeting latin america with sophisticated phishing scheme Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme
Next Post: Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox watch out for 'latrodectus' this malware could be in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.