In the first half (H1) of 2021, ransomware attacks skyrocketed, eclipsing the entire volume for 2020 in only six months, according to the mid-year update to the SonicWall report. In a new paradigm for cybercrime, SonicWall is analyzing how threat actors are using any means possible to further their malicious intents.
Crime-as-a-Service (CaaS) is the practice of experienced cybercriminals selling access to the tools and knowledge needed to execute cybercrime – in particular, it’s often used to create phishing attacks.
Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners.
The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall rules.You should test in all ways to guarantee there is no security loophole.
Let’s see how we conduct a step by step Network penetration testing by using some famous network scanners.
This report will go through an intrusion that went from an Excel file to domain wide ransomware. The threat actors used BazarCall to install Trickbot in the environment which downloaded an executed a Cobalt Strike Beacon. From there the threat actor discovered the internal network before moving laterally to a domain controller for additional discovery. A couple days later, the threat actors came back and executed Conti ransomware across the domain.
According to a report released by SonicWall, over 300 million ransomware attacks were observed in the first half of 2021, surpassing 2020s total of 302.73 million. And the highlight of the find is that the month June 2021 alone witnessed a record new high of 78.4 million file encrypting malware than compared to April and May of this year.
There has been a massive spike in the attacks in United States and UK alone as the attacks in the said two nations made up 185 percent and 144 percent of the total number of attacks, respectively.
Uncertainness accompanied by anxiety about when the businesses will leap back to normalcy, and the recent work from home norm has made the cyber crooks launch sophisticated attacks on corporations to gain finances and to sow discord. And this is said to have led to the rise in ransomware attacks.
The 2021 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses is a demonstrative list of the most common issues experienced over the previous two calendar years.
These weaknesses are risky because they are many times easy to find, exploit, and can allow adversaries to take over a system, steal data, or prevent an application from working.
Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects.
A Keeper Security survey of 2,000 U.S.-based workers found that nearly all companies targeted by a ransomware attack paid the ransom, and another 22% did not disclose whether or not they paid, which suggests the real number could be much higher.
The vast majority—87% of impacted companies—said they enacted stricter security protocols after the attack.
More than three-fourths (77% percent of respondents) reported being unable to access systems or networks as a result, with 30% down for a day or less, 26% offline for up to seven days and 27% getting knocked out for more than a week.
As for causes, 42% of ransomware attacks originated from phishing emails, 23% from malicious websites and 21% from compromised passwords.
Oliver Tavakoli, CTO at Vectra, an AI cybersecurity company, explained that ransomware starts out like all cyberattacks—but it differs in that it ends in data exfiltration, data encryption and extortion.