Wednesday, June 7, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Ransomware attacks are decreasing, but companies remain vulnerable

Researcher by Researcher
January 11, 2023
in Cybersecurity
0
Ransomware attacks are decreasing, but companies remain vulnerable
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Only 25% of the organizations surveyed by Delinea were hit by ransomware attacks in 2022, but fewer companies are taking proactive steps to prevent such attacks.

A globe with the text ransomware spinning around it.
Image: darkfoxelixir/Adobe Stock

There’s good news and bad news in the world of ransomware, according to a report released by privileged access management company Delinea. Based on survey results, these types of attacks have decreased over the past 12 months, but the decline may be causing companies to become more complacent — to the point that they’re failing to take the necessary precautions.

The new report “Making the Hard Choices for Ransomware Readiness and Response” was based on a survey of 300 IT and security decision-makers in the U.S. conducted on Delinea’s behalf by Censuswide. The survey analyzed trends in ransomware in 2022 compared with 2021.

Related articles

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023

SEE: Mobile device security policy (TechRepublic Premium)

Jump to:

Fewer victims of ransomware in 2022

The Delinea report found:

  • Only a quarter of the respondents said they were victims of ransomware attacks in 2022, a significant drop from 64% the previous year.
  • Some 56% of organizations with 100 or more employees were hit by ransomware in 2022, down from 70% in 2021.
  • Over the same period, 13% of companies with fewer than 100 staffers were victimized by ransomware, down from 34%.

Why the decline? Delinea cited a few possible reasons: One factor may be the disbanding of the Conti ransomware group into smaller factions; another cause might be the greater effectiveness of security tools in preventing attacks; alternatively, it’s possible fewer victims are reporting ransomware attacks.

Fewer organizations willing to pay the ransom

Must-read security coverage

The number of victims willing to pay ransoms to retrieve their data is also on a downswing: Just 68% of organizations hit by ransomware in 2022 paid the ransom — while still a majority, this figure is down from 82% the previous year.

At the same time, the average ransomware payment has increased. Payments in cases seen by Palo Alto Networks’ Unit 42 group reached almost $1 million over the first five months of 2022, a jump of 71% from the same period in 2021.

There are a few reasons why victims may be less willing to pay the ransom:

  • The FBI and other authorities have cautioned that paying the ransom doesn’t mean you’ll get your data back.
  • Payments encourage criminals to stage more ransomware attacks in a seemingly endless cycle.
  • More organizations could be turning to effective data backup tools to recover their files.

Victims still suffer the consequences of cyberattacks

Though fewer companies may have been victims of ransomware last year, those that do get hit suffer several consequences. Among the respondents who reported attacks:

  • More than half (56%) said they saw a loss in revenue.
  • Some 43% witnessed damage to their reputation.
  • Exactly half (50%) lost customers, and 24% had to lay off workers.
  • Only 3% said they experienced no repercussions.

Decline in certain measures to prevent ransomware

Along with the drop in ransomware attacks has been a decline in certain measures that companies take to protect themselves. Among those surveyed, 71% said they have an incident response plan, down from 94% the previous year. Some 68% said they currently devote money from their budget to defend against ransomware, down from 93% the prior year.

However, 76% of organizations hit by a ransomware attack boosted their security budget in response, up from 72% the prior year. The irony here is that many IT departments will receive more money for their security budget only after they’ve been attacked.

Ransomware: The most vulnerable areas

Whether or not they’re allocating enough money and resources for security, the IT decision makers surveyed are certainly aware of the threat that ransomware poses. Asked to identify the most vulnerable areas for ransomware attacks:

  • More than half (52%) identified email.
  • Some 42% pointed to software applications.
  • Less than one-third (29%) recognized privileged access as a threat vector.
  • Just 27% noted the cloud.
  • Only 16% named their endpoints.

Recommendations to prevent ransomware attacks

How can organizations better protect themselves against ransomware attacks? The respondents cited several steps that they’ve taken themselves. Some 53% said they regularly update their systems and software, 52% back up critical data, 51% enforce password best practices and 50% require multi-factor authentication. Other measures taken include application control, disabling macros from email attachments, and adopting a least privilege posture.

Delinea chief security scientist and advisory CISO Joseph Carson cited a number of measures. Some are relatively obvious, such as running frequent data backups, implementing an effective incident response plan and investing in cyber insurance.

“Organizations should take a more proactive approach to cybersecurity, in particular where they are most vulnerable to these types of attacks; namely identity and access controls,” Carson said. “By taking a least privilege approach, founded on zero trust principles and enforced by methods such as password vaulting and multi-factor authentication, organizations can significantly reduce their vulnerability to ransomware attacks.”

Intel 471 cyber threat intelligence analyst Jeremy Kirk also had suggestions to offer.

“Today, organizations can go from an initial intrusion to a full-blown ransomware incident in a much shorter period of time,” Kirk said. “Ideally, organizations should catch the initial intrusion or the follow-on malicious activity. Ransomware actors often focus on exfiltrating sensitive data before launching the file-encrypting malware, so often there is time to stop a debilitating encryption attack.”

Kirk also urges organizations to subscribe to threat intelligence platforms to help track ransomware gangs and their tactics. Using both automated collection tools and human intelligence, these platforms can spot changes in the ransomware scene and offer appropriate advice.

Understand your company’s exposure to ransomware and more with the Security risk assessment checklist from TechRepublic Premium.



Source link

Tags: AttackscompaniesdecreasingRansomwareremainvulnerable
Share76Tweet47

Related Posts

CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
0

North Korean threat group Kimsuky has recently launched a social engineering campaign against a number of experts specializing in North...

Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023
0

Open source password manager KeePass was updated over the weekend to patch a vulnerability allowing attackers to retrieve the cleartext...

Zero-day MOVEit Transfer vulnerability exploited in the wild

Zero-day MOVEit Transfer vulnerability exploited in the wild

June 6, 2023
0

Shodan search engine results for internet-facing MOVEit instances. Image: Shodan The Cybersecurity & Infrastructure Security Agency has issued an alert...

New DDoS Attack Vector Abuses Content Filtering Systems

UNC4857 Exploits MOVEit Transfer Flaw in Data Extortion Attacks

June 6, 2023
0

A newly discovered threat campaign has been observed exploiting the recently uncovered, critical-severity MOVEit Transfer vulnerability in order to launch...

Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
0

Security researchers recently identified more than 30 malicious extensions that had made their way into the Chrome web store, potentially...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

June 6, 2023
Sentra Raises $30 Million for DSPM Technology

KeePass Update Patches Vulnerability Exposing Master Password

June 6, 2023

Recent Posts

Release date, price and more

Release date, price and more

June 7, 2023
CISA: North Korea-Backed Actors Using Maui Ransomware

North Korean Attackers Target Google Account Credentials

June 7, 2023
7 tips for spotting a fake mobile app

7 tips for spotting a fake mobile app

June 6, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved