Ransomware Lives On, Blending Hacktivism and Crime, Fueled by AI
好,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章主要讲的是勒索软件的演变和趋势。提到了双重勒索已经很严重了,现在又出现了四重勒索,让组织更难应对。执法打击后,这些团伙会改头换面继续活动。 然后是生成式AI(GenAI)的影响,像Black Basta和FunkSec这样的团伙利用大语言模型来改进攻击手段,让攻击更容易扩展。这不仅提高了攻击效率,还让技术不太好的攻击者也能发起破坏性攻击。 报告中还提到2025年通过TrickBot恶意软件家族敲诈了超过7.24亿美元。犯罪分子建立了可扩展的商业模式,预计勒索软件攻击会继续增加。 另外,勒索软件的目标转向了非盈利和教育机构,因为这些机构资源丰富但安全性较低。防御方面需要加强身份验证和访问控制,减少攻击面。 最后,文章还提到混合型勒索软件黑客活动分子的兴起,他们结合政治动机和犯罪意图,使用RaaS平台进行攻击。 总结下来,重点包括:勒索软件的演变、四重勒索、GenAI的影响、高额赎金、目标转向非盈利机构、防御措施以及混合型黑客活动分子的出现。 现在要把这些信息浓缩到100字以内。要确保涵盖主要趋势和关键点:勒索软件升级为四重勒索、利用AI提升攻击能力、赎金金额创新高、目标转向特定机构、防御建议以及新兴的混合型威胁。 这样组织起来应该能准确传达文章的核心内容。 </think> 勒索软件持续进化,从双重勒索升级至四重勒索,并利用生成式AI提升攻击能力。2025年通过TrickBot恶意软件敲诈超7.24亿美元。犯罪分子转向非盈利和教育机构为目标,并结合政治动机发起混合型攻击。防御需加强身份验证与访问控制以减少风险。 2026-4-13 06:57:10 Author: securityboulevard.com(查看原文) 阅读量:9 收藏

Double extortion is bad enough—that’s the current tactic favored by ransomware groups—but the emerging quadruple extortion promises to further complicate mitigation and response by targeted organizations, prompting an escalation in extortion payments.  

Yet that’s just one piece of evidence that ransomware continues to evolve despite high-profile takedowns by law enforcement—they just reincarnate or rebrand as new groups, new research by Akamai shows. Of course, the biggest game-changer is GenAI, as RasS operators like Black Basta and FunkSec press LLMs into service to generate code and greatly improve the social engineering techniques that give bad actors a foot in the door and to scale up attacks, opening the door for even less sophisticated actors to execute damaging attacks. 

“Ransomware groups continue to seek additional ways to generate profit, such as by pressuring victims and weaponizing compliance,”  researchers at Akamai note in their Ransomware Report 2025. 

Noting that ransomware tactics have moved “away from traditional encryption-centric ransomware tactics towards more sophisticated and advanced extortion methods,” Nathaniel Jones, vice president, security and AI strategy and field CISO at Darktrace, says, “rather than relying solely on encrypting a target’s data for ransom, threat actors will increasingly employ double or even triple extortion strategies, encrypting sensitive data but also threatening to leak or sell stolen data unless their ransom demands are met.” 

Their efforts are paying off, with groups in 2025 extorting more than $724 million in cryptocurrency using TrickBot malware family strains, popular among ransomware operators.  

“Criminals have established a scalable business model, and we expect to see ransomware attack volume to continue growing,” says Trey Ford, chief strategy and trust officer at Bugcrowd.  

“We also need to keep in mind that there will be a gap in reported incidents versus total ransomware incidents,” says Ford.  

One of the most dramatic shifts in the threat landscape, though, is the rise of hybrid ransomware hacktivist groups blending political and ideological motives with criminal intent. Those groups spent last year leveraging RaaS platforms like CyberVolk, Dragon RaaS, KillSec, Stormous and DragonForce to amp up the impact of their attacks. The hacktivist groups Head Mare, Twelve and Nullbulge tapped LockBit ransomware to provoke political disruption, with the latter targeting AI-driven online communities and platforms as well as gaming tools.  

The hacktivist groups Head Mare, Twelve, and NullBulge often use LockBit ransomware (built from leaked or publicly available builders) for political disruption. NullBulge specifically uses it to target online communities and platforms that are operating with AI and online gaming tools.  

“The growth of RaaS marketplaces places greater opportunity on the side of threat actors who no longer must extract ransom payments to see profit, as they can use subscription models to return revenue for their ransomware development and deployment,” says Jones.  

The report also found that the goals and strategies of cryptominers are in accordance with ransomware groups—almost 50%  of the cryptomining attacks analyzed “targeted nonprofit and educational organizations, likely because they possess substantial computational resources and are less secure than other industries,” the researchers said. 

Defenders must act accordingly. 

“Larger targets, with larger payout potential, will have seen the most aggressive corporate investment (process and technology), mitigating exposure to this attack pattern; it is still an unsolved space,” says Ford. 

And James Maude, field CTO at BeyondTrust, says that “to effectively deal with ransomware and other threats, we need to invest in shifting left and think more about securing identities and access to reduce our attack surface and blast radius in the event of compromise rather than just thinking post breach.” 

Ransomware and other threats, he contends, “are only as effective as the privileges and access they manage to acquire, so if we can implement better hygiene and focus on least privilege, then the threat actors are far less likely to ransomware us in the first place.” 

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/04/ransomware-lives-on-blending-hacktivism-and-crime-fueled-by-ai/
如有侵权请联系:admin#unsafe.sh