AGL38▲ 0.01 (0.00%)AIRLINK210.38▼ -5.15 (-0.02%)BOP9.48▼ -0.32 (-0.03%)CNERGY6.48▼ -0.31 (-0.05%)DCL8.96▼ -0.21 (-0.02%)DFML38.37▼ -0.59 (-0.02%)DGKC96.92▼ -3.33 (-0.03%)FCCL36.4▼ -0.3 (-0.01%)FFL14.95▲ 0.46 (0.03%)HUBC130.69▼ -3.44 (-0.03%)HUMNL13.29▼ -0.34 (-0.02%)KEL5.5▼ -0.19 (-0.03%)KOSM6.93▼ -0.39 (-0.05%)MLCF44.78▼ -1.09 (-0.02%)NBP59.07▼ -2.21 (-0.04%)OGDC230.13▼ -2.46 (-0.01%)PAEL39.29▼ -1.44 (-0.04%)PIBTL8.31▼ -0.27 (-0.03%)PPL200.35▼ -2.99 (-0.01%)PRL38.88▼ -1.93 (-0.05%)PTC26.88▼ -1.43 (-0.05%)SEARL103.63▼ -4.88 (-0.04%)TELE8.45▼ -0.29 (-0.03%)TOMCL35.25▼ -0.58 (-0.02%)TPLP13.52▼ -0.32 (-0.02%)TREET25.01▲ 0.63 (0.03%)TRG64.12▲ 2.97 (0.05%)UNITY34.52▼ -0.32 (-0.01%)WTL1.78▲ 0.06 (0.03%)

30% surge in Targeted ransomware groups attacking governments, specific high-profile organizations, say Kaspersky experts

Share
Tweet
WhatsApp
Share on Linkedin
[tta_listen_btn]

Islamabad: Targeted ransomware groups have grown in numbers and are notorious for attacking governments, specific high-profile organizations, or selective group of people within an organization. An in-depth research by Kaspersky experts shows a surge in the number of targeted ransomware groups globally by 30% from 2022 to 2023. In parallel to this increase, the number of victims of targeted ransomware attacks spiked by 70% within the same time period.

Similar to regular businesses, targeted ransomware groups hire cybercriminals as employees to run extensive and intelligent operations to launch increasingly sophisticated targeted ransomware attacks.

Kaspersky researchers closely monitored about 60 targeted ransomware groups in 2023, compared to about 46 groups in 2022, and discovered incidents that indicated collaboration between targeted ransomware groups. In some cases, groups known for trading access points into corporate networks and systems, sold initial points of entry to advanced ransomware groups that are capable of launching more sophisticated attacks. Since cybercriminals have to cross multiple stages to launch a targeted ransomware attack, such collaborations allow them to save time and go straight into network reconnaissance or infection.

In 2023, marking its seventh year as a key contributor to the No More Ransom initiative, Kaspersky’s free decryption tools were downloaded more than 360,000 times, aiding data recovery for over 2 million users affected by ransomware. However, despite these significant accomplishments, ransomware payments globally surpassed USD 1.1 billion in 2023, marking an unprecedented high.

“Targeted ransomware groups are very persistent and have a huge appetite for extortion. For example, if a victim refuses to pay ransom, the cybercriminals often threaten to make the stolen data public. In some cases, these cybercriminals also filed GDPR or SEC complaints in certain regions against the victim organizations for breaking data protection laws,” comments Maher Yamout, Senior Security Researcher at Kaspersky.

To protect your business from targeted ransomware attacks, Keep all devices and systems updated to prevent attackers from exploiting vulnerabilities and set up offline backups that intruders cannot misuse, and make sure you can access it quickly in an emergency. Kaspersky advices to install a cybersecurity solution that relies on a multi layered security approach that safeguards systems against ransomware at the malware delivery and execution stages. The Kaspersky Threat Intelligence is also an essential tool to have which can provide in-depth data and real-time insights on the history, motivations and operations of targeted ransomware groups. Kaspersky has also developed free tools for public use such as the Kaspersky Anti-Ransomware tool and No more Ransom, that helps block ransomware and decrypt files.

 

Employee education and cybersecurity training is necessary as human error is a common cause for cybersecurity breach and can serve as an initial point of access for ransomware attacks.

Related Posts

Get Alerts

© 2024 All rights reserved | Pakistan Observer