Diamond Member Pelican Press 0 Posted November 25, 2024 Diamond Member Share Posted November 25, 2024 This is the hidden content, please Sign In or Sign Up Geopolitical strife drives increased ransomware activity Recorded ransomware ******* volumes rose by 19% during October 2024 to a total of 468 incidents worldwide, a significant number of them in the US, where the controversial presidential election likely emboldened Russian-speaking threat actors to strike, according to This is the hidden content, please Sign In or Sign Up latest monthly Threat pulse report. Although the full-scale of attempted This is the hidden content, please Sign In or Sign Up is not yet fully known, NCC’s head of threat intelligence, Matt Hull, said it was little surprise the final few weeks before the 5 November poll saw ramping amounts of threat activity. “Geopolitical motivations, like the US election, showed that nation states such as Russia continue to have heavy influence on global volumes of cyber attacks,” he said. “The data shows that we are witnessing changing dynamics of the threat landscape, with nation states and organised ****** groups increasingly collaborating,” said Hull. “As different threat actors leverage each other’s resources, it is crucial for organisations to ensure that they’re on top of fundamental security practices such as password management, endpoint security and multi-factor authentication.” Indeed, broken out by geography, the North America region – which also includes countries like Canada and Mexico – accounted for 272, or 56%, of the recorded ransomware attacks. In comparison, 97 attacks, 20%, victimised organisations in Europe, so all in all, over three-quarters of all ransomware attacks seen last month targeted these two regions. Of course, this is not to exclude the rest of the world, and one ******* in particular aptly demonstrated the apparent blurring of the lines between nation states and organised **********. This was an incident in which systems at This is the hidden content, please Sign In or Sign Up were crippled by Underground ransomware, which is linked to Russian cyber ****** group Storm-0978, or RomCom. The double extortion ******* targeted employee, job candidate and business partner data, and caused outages and service disruptions. It likely began via CVE-2023-36884, a remote code ********** vuln in This is the hidden content, please Sign In or Sign Up Office which is known to have been targeted by Russian state actors; and according to NCC, RomCom is thought to be one of a number of gangs that conduct attacks on behalf of the Kremlin. NCC said that growing geopolitical tension between Russia and Japan added a “compelling” layer to the incident. Russia, which has held the island of Sakhalin – part of the ancestral homeland of Japan’s indigenous Ainu people – and the nearby Kuril Islands, since the end of the Second World War, is thought to be concerned by Japan’s increasing military collaboration with the Nato alliance, and Moscow protested a recent ****** military exercise, Keen Sword 2024, between the US and Japan. “These military activities and Japan’s bolstered defence posture may have contributed to a rise in aggressive tactics by Russian-affiliated cyber entities,” wrote the report’s authors. “Attacks on ********* companies could serve as a form of pressure or retaliation, signalling Russia’s discontent with Japan’s defence strategies. By targeting key ********* enterprises, Russia, through affiliated cyber ********* groups, might aim to disrupt economic stability and project power without overt military confrontation. “The situation shows the complexity of modern cyber warfare, where ********* enterprises and state-backed actors could pursue both financial and strategic objectives … As such, businesses should encompass a variety of threats, traditional and state-backed, in their defence strategy.” RansomHub holds top spot In terms of the most prolific ransomware operators, it was This is the hidden content, please Sign In or Sign Up that continued its dominance as the most active gang in October, taking responsibility for 68 attacks, although this was down a little on the previous month. The second-place spot was held by This is the hidden content, please Sign In or Sign Up , which accounted for about 55 attacks; followed by Killsec, with between 30 and 40; Sarcoma, with about 30; and Meow, with about 25. The rest of the top 10 most active operations last month were Fog, Hunters, ElDorado, Medusa and BlackSuit. Across the board, the industrials sector, which includes operators of critical national infrastructure (CNI), remained the most targeted, accounting for 148, or 30%, of the observed attacks. The consumer discretionary sector (retail) followed, with 100 attacks; and the healthcare sector accounted for 55. “As demonstrated through the focus on CNI, attacks are becoming less random and more targeted to organisations that will experience maximum impact,” said Hull. “Those who rely on ‘up-time’ and hold large amounts of intellectual property or personally identifiable information are high-value targets.” This is the hidden content, please Sign In or Sign Up #Geopolitical #strife #drives #increased #ransomware #activity This is the hidden content, please Sign In or Sign Up This is the hidden content, please Sign In or Sign Up Link to comment https://hopzone.eu/forums/topic/174928-geopolitical-strife-drives-increased-ransomware-activity/ Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now