Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More
Cybercrime is running rampant. Yet, while the latest exploits of the Lapsus$ group have gotten a lot of attention, particularly in the aftermath of the Uber and GTA VI breaches, LockBit 3.0 has largely slid under the radar, despite gathering dozens of victims.
In fact, according to research released today by NCC Group’s Global Threat Intelligence Team, Lockbit 3.0 accounted for 40% of all ransomware incidents in August, making it the most threatening ransomware threat that month, involved in a total of 64 incidents.
This surge in ransomware comes shortly after the group rebranded from LockBit 2.0 in June earlier this year. It also comes after the gang made the decision to adopt triple-extortion techniques to extract the maximum payout from target organizations.
Above all, these findings indicate that ransomware threats are here to stay, at least for now, meaning that enterprises need to be prepared to prevent intrusions if they want to avoid being put in the lose-lose situation of paying a ransom or losing high-value data.
Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.
Ransomware: A virtual blight that won’t go away
It’s no secret that ransomware remains one of the most serious and persistent cyberthreats facing modern enterprises.
Earlier this year, Verizon research found that year-over-year ransomware attacks increased by 13%, and highlighted that 82% of breaches involved the human element.
Unfortunately, other analysts aren’t optimistic that ransomware threats will decrease anytime soon. Just last month, Acronis released a report estimating that global ransomware damages will exceed $30 billion by 2023.
NCC Group’s findings seem to echo this bleak assessment, despite a small decrease in the number of attacks.
“While there is a slight reduction in the volume of attacks in August, there have been some considerable changes among threat groups in particular,” said global head of threat intelligence at NCC Group, Matt Hull.
“LockBit 3.0 appears to be re-establishing its operations since rebranding in June, while Conti-affiliated BlackBasta looks to be establishing itself within the ransomware landscape following Conti’s operations rebranding,” Hull said.
Hull also noted that new threat actor IceFire has burst on the scene with a spate of attacks in the latter half of August, targeting web hosting services in an attempt to gather the largest amount of data possible.
The way forward: Security awareness
In order to address ransomware threats, organizations need to start concentrating on mitigating human risk, and teaching employees how to better manage their credentials.
Nowhere is the need for this more clearly illustrated than the fact that 25% of the S&P 500, and half of the top 20 most valuable public U.S. companies, have had at least one credential for sale on the dark web.
With regular security-awareness training, enterprises can teach employees security best practices, like how to select strong passwords, the importance of not clicking on links or attachments in phishing emails and turning on multifactor authentication can go a long way toward decreasing ransomware breaches.
This training can then be supplemented with vulnerability and attack surface management solutions, which can help to identify and mitigate exploits in the environment. After all, the fewer entry points there are, the better.
VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.