Ransomware incidents appear to be down, but don’t start singing “We are the champions” quite yet. Cybercriminals just might be switching to a tactic that’s a bit easier and doesn’t involve all that complicated encrypting, decrypting, and negotiating.
Attackers are seemingly moving to abandon ransomware altogether, according to a new report from the cybersecurity software company CrowdStrike. In 2022, CrowdStrike Intelligence observed a 20% increase in data theft and extortion campaigns that didn’t involve the multi-step encryption attack.
“Ransomware is complex. You have to manage cryptography, and file unlockers, and lockers, and negotiations. If you just steal the data and threaten to dispose of it, it’s a lot less work,” said Adam Meyers, senior VP of intelligence at the cybersecurity software company CrowdStrike.
Not itsy, nor bitsy. In February, cybersecurity services firm Mandiant reported a 15% reduction in ransomware-intrusion responses from 2021 to 2022. IT services firm AAG noted that ransomware attacks dropped 23% in 2022 compared to the previous year.
CrowdStrike saw a decline as well, citing a dip in cryptocurrency values and a breakup of major ransomware gangs, like the FBI’s halting of the Hive.
Plenty of 2022 attacks, however, involved data demands, with no ransomware in sight.
In early 2022, a group known as SLIPPY SPIDER targeted tech companies, including Microsoft, Nvidia, and Samsung, in a data-theft and extortion spree. The adversaries used their public Telegram channels to leak data like victim source code, employee credentials, and personally identifiable data.
In a data-extortion (and ransomware-less) attack, the stakes effectively shift from system downtime to the regulatory impact of sensitive-data loss, said Meyers. Exposed hospital data potentially could violate HIPAA requirements. Compromised customer data could lead to a class-action lawsuit.
And with no ransomware, negotiations can move quickly.
Read more here.—BH
Do you work in IT or have information about your IT department you want to share? Email [email protected].