• Home Page
  • About Us
  • Advertise
  • Contact Us
  • My Account

TechVisibility

  • Home page
  • News
  • Computing
  • Reviews
  • Apps
  • Gaming
  • Mobile
  • Audio
  • Video
  • Gadgets
  • FinTech
  • EV
  • More
    • Antivirus
    • Cameras
    • Cryptocurrency
    • NFT
    • Phones
    • Security
    • Smart Home
    • Software
    • Streaming
    • TVs
    • Wearables
    • Web hosting
    • What To Watch
You are at :Home»Security»Ransomware Attacks Are Becoming Increasingly Sophisticated And Difficult To Defend Against
Photo credit: iStock

Ransomware Attacks Are Becoming Increasingly Sophisticated And Difficult To Defend Against

Maria del Luna 14 Nov 2021 Security Leave a comment 338 Views

Facebook Twitter linkedin Pinterest Tumblr WhatsAppt Telegram Email More
  • Photo credit: iStock

Ransomware attackers are probing for weaknesses in known common vulnerabilities and exposures (CVEs) and exploiting them quickly, launching attacks faster than vendor teams can patch them. Worse still, attackers are making attacks more complex, expensive, and difficult to detect and stop, exploiting potential targets’ flaws faster than businesses can respond.

Two recent research studies — Ivanti‘s latest report, which was conducted in collaboration with Cyber Security Works and Cyware, and a second study conducted on behalf of Cyware by Forrester Consulting — show that the gap between how quickly enterprises can identify a ransomware threat and the speed with which a cyberattack can occur is widening.

Both studies provide a stark assessment of how far enterprises are behind in detecting and preventing ransomware attacks.

Ransomware attackers are rapidly expanding their attack arsenal and adopting new technologies. The Ransomware Index Update Q3 2021 discovered ransomware groups expanding their attack arsenal with 12 new vulnerability associations in Q3, which was twice as many as the previous quarter. Newer, more sophisticated attack techniques are being used, such as Trojan-as-a-service and dropper-as-a-service (DaaS).

In addition, more ransomware code has been leaked online in the last year as more advanced cybercriminals seek to recruit less advanced gangs to join their networks.

Ransomware will continue to be one of the most popular cyberattack strategies in 2021. In just the third quarter of 2021, the number of known ransomware vulnerabilities increased from 266 to 278.

In addition, there has been a 4.5 percent increase in the number of trending vulnerabilities actively exploited to launch attacks, bringing the total number to 140. In addition, in Q3, Ivanti’s Index Update discovered five new ransomware families, bringing the total number of ransomware families in the world to 151.

According to recent attack patterns, ransomware groups are mining known CVEs to find and exploit zero-day vulnerabilities before they are added to the National Vulnerability Database (NVD) and patches are released: 258 CVEs created before 2021 are now associated with ransomware.

The large number of legacy CVEs demonstrates how determined ransomware attackers are to exploit past CVE flaws. Today, ransomware is linked to 92.4 percent of all vulnerabilities tracked.

Threat intelligence is difficult to come by

Per the Forrester Opportunity Snapshot study, commissioned by Cyware, 71% of security leaders believe their teams require access to threat intelligence, security operations data, incident response, and vulnerability data.

However, 65% of respondents say it is difficult to provide security teams with consistent data access today. Sixty-four percent of security operations centers (SOCs), incident response, and threat intelligence data cannot be shared cross-functionally today, limiting the amount of SOC, incident response, and threat intelligence data shared across departments.

Due to the lack of real-time threat intelligence data available to businesses, attackers are able to launch more complex and difficult attacks while demanding higher ransoms.

CVEs’ flaws are being exploited

Patches are available, but because legacy applications and operating systems haven’t been patched, businesses are still vulnerable to ransomware attacks.

Conclusion

Since ransomware attackers are quicker to incorporate new technologies into their arsenals and launch attacks, the power balance is shifting in their favor. As a result, if businesses are to stop ransomware attacks, they must standardize on threat intelligence, patch management, and, most importantly, zero-trust security.

RELATED ARTICLES:

Ransomware Defenses Tricks Centered Around Three-Step Plan

Hackers Hate This Security Tricks: Here’s How Efficient They Are

CVEs Cyber Security Works Cybersecurity Cyware National Vulnerability Database ransomware Ransomware Attackers Ransomware Attacks ransomware groups 2021-11-14
Maria del Luna
Tags CVEs Cyber Security Works Cybersecurity Cyware National Vulnerability Database ransomware Ransomware Attackers Ransomware Attacks ransomware groups

Author

Posted by : Maria del Luna
Maria del Luna is a technophilic writer at TechVisibility who primarily covers the latest in smartphones, social media apps, various software, hybrid cars, and all things celestial. When she is not writing news, she either serves her beloved feline masters, or plays mobile games for hours on end.
Previous Article :

Google Pixel 6 Issues — All Known Problems And Their Solutions

Next Article :

Qualcomm Snapdragon 898 — Get To Know The 2022’s Flagship Phone Chipset

Related Articles

T-Mobile US hack: Hackers sell over 30 million customer data for 6 bitcoin

T-Mobile US hack: Hackers sell over 30 million customer data for 6 bitcoin

Summer Collins 16 Aug 2021
Facebook’s Data Harvesting Machine: Here’s Why You Should Worry About It

Facebook’s Data Harvesting Machine: Here’s Why You Should Worry About It

Noah Gravel 09 May 2021
The 7 Significant Technology Trends to Look Forward this 2020

The 7 Significant Technology Trends to Look Forward this 2020

Jody G 24 Jun 2020
A Woman Was Harassed Sexually On Meta VR Social Media Platform

A Woman Was Harassed Sexually On Meta VR Social Media Platform

Maria del Luna 16 Dec 2021
Microsoft warns a possible next SolarWinds attack

Microsoft warns a possible next SolarWinds attack

Summer Collins 28 May 2021
The smarter choice for a security camera: Arlo Pro 3

The smarter choice for a security camera: Arlo Pro 3

Azriel B 12 Dec 2020

Leave a Reply

  • Facebook Comments
  • Disqus Comments (0)
Specify a Disqus shortname at Social Comments options page in admin panel

Subscribe to our Channel

YouTube Videos

Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo
Youtubevideo

Advertisement


TechVisibility


2493 Technology Drive
Hayward, CA 94545
800-601-4491
contact@techvisibility.com

Follow us

Recent Posts

  • Apple—Requires Mobile App Developers To Allow You To Simply Remove Your App Account

    Apple—Requires Mobile App Developers To Allow You To Simply Remove Your App Account

    Noah Gravel 27 May 2022
  • Google Takes on OpenAI With A Fancy Text-to-Image Generator

    Google Takes on OpenAI With A Fancy Text-to-Image Generator

    Noah Gravel 27 May 2022

Advertisement

  • Terms & Conditions
  • Privacy Policy
  • Cookies Policy
  • Accessibility Statement
  • Advertise
  • About Us
  • Contact Us
  • Do not sell my info
  • YouTube Videos
  • My Account
Copyright 2021, All Rights Reserved
Developed By IdealVisibility.com
Go to mobile version