As ransomware’s fundamental nature shifts from encryption to data exfiltration, organizations’ data backup and recovery practices no longer protect them from attacks. Over the course of the past few years, the cybercriminal landscape changed too.
As criminal ransomware organizations adopt “as-a-Service” business models on the dark web, attackers of all levels can participate. Cybercriminals can now purchase the entire ransomware infrastructure on the dark web.
For this analysis, the Flare research team reviewed data from thousands of double and triple extortion ransomware attacks to identify trends around:
Read our full report, Data Extortion Ransomware & The Cybercrime Supply Chain: Key Trends in 2023, and/or continue reading for the highlights.
As ransomware attacks have changed over the years, the vocabulary that discusses different actors and variants has evolved too. Some key terms used when discussing ransomware organizations and variants include:
Ransomware groups exist within a broader cybercrime ecosystem that includes cybercriminals selling resources like:
Additionally, ransomware organizations are self-sufficient entities that take on different business models, including:
The different business models impact how the cybercriminal organization operates within the broader ecosystem.
Often underestimated, infostealer malware and stealer logs infect victim computers mainly through cracked software downloads, malvertising, and phishing emails. Once executed, the malware exfiltrates devices’ data, including the browser fingerprint containing stored credentials, active session cookies, credit card information, and host information.
Ransomware groups can purchase this data on dark web marketplaces and illegal Telegram channels enabling access to:
According to Flare’s research, a sample of 20+million unique stealer logs identified:
MaaS and PaaS vendors provide the infrastructure and malware necessary for cybercriminals to access privileged systems.
Examples of the services these criminal organizations provide include:
With these services, unsophisticated ransomware operators can quickly, efficiently, and successfully deploy attacks.
Operating largely on the Exploit and XSS forums, IABs specialize in gaining and selling access to corporate IT environments. While IABs only post one or two listings per day, the listings are often high-quality, containing the access ransomware operators need to compromise network and infrastructure.
Ransomware groups use these to communicate with affiliates, often posting updates like:
Cybercriminals can use these websites to pressure victims into paying the ransom.
To understand key ransomware trends in 2023, Flare analyzed more than 80 ransom publications over more than 18 months, comprising thousands of events.
According to this research, we found a 112% annualized increase in data extortion tactics primarily targeting the following industries:
Our analysis of the groups and affiliates responsible for the majority of attacks found the following most prominent ones:
The three primary attack vectors that ransomware organizations target are:
With a new class of RAT dubbed infostealer malware, stealer logs have become a greater threat, especially those containing active session cookies that allow attackers to bypass two-factor authentication (2FA) and multi-factor authentication (MFA).
Since people often reuse passwords across multiple services, ransomware operators can use stolen credentials as an easy entry point, giving them the opportunity to move laterally and attempt to access AD. At that point, they escalate privileges to steal files.
Flare’s proactive external cyber threat exposure management solution constantly scans the online world, including the clear & dark web and illegal Telegram channels.
With 4,000 cybercrime communities monitored, our platform provides data from 14 million stealer logs and two million threat actor profiles. Since our platform automatically collects, analyzes, structures, and contextualizes dark web data, you gain the high-value intelligence specific to your organization for faster dark web investigations and significant reduction in data leak incident response costs.
Sign up for a free trial to learn more about threat exposure management with Flare.
The post Threat Spotlight: Data Extortion Ransomware: Key Trends in 2023 appeared first on Flare | Cyber Threat Intel | Digital Risk Protection.
*** This is a Security Bloggers Network syndicated blog from Flare | Cyber Threat Intel | Digital Risk Protection authored by Flare. Read the original post at: https://flare.io/learn/resources/blog/threat-spotlight-initial-access-brokers-on-russian-hacking-forums-2/