Sunday, October 17, 2021

Ransom payments are declining as many victims decide not to pay

Must Read

Formbook malware Upgraded as an XLoader malware to Attack macOS Systems

Researchers have spotted an upgraded malware variant of Formbook malware which is now Upgraded as an XLoader malware to...

Google Chrome blocks eight ports against new NAT Slipstreaming attack

Following the discovery of the NAT Slipstreaming 2.0 attack this week, Google says it will block Chrome traffic on...

NHS Error Exposes Information on Hundreds of Staff and Patients

Hundreds of NHS staff and patients have had their data vulnerable to strangers following inner procedure failures, and it...

A high percentage of ransom victims choose to opt-out of pay the ransom amounts but don’t assume that the ransom will go away anytime soon.

The ransom rate paid to cyber criminals following a ransomware attack dropped as more and more companies were reluctant to fulfill extortion demands.

An analysis by cybersecurity company Coveware found that the average ransom price paid following the ransomware attack dropped by a third in the last quarter of 2020, falling to $ 154,108 from $ 233,817 three months ago.

The company attributes the drop in the average ransom payment to victims choosing not to give into demands to pay bitcoin in exchange for the decryption key, in which criminals say they will restore the network to functional Mode.

While it is good that a high percentage of these victims choose not to pay cybercriminals, there are still several organizations that offer it – allowing the software to continue, even if the attackers have been making little money.

However, it may be enough for some ransom operators to consider whether the effort is worthwhile.

“When a few companies pay, no matter what the cause, it has a long-term impact, and what can be combined over time can make a difference in the attack,” the Cover blog post said.

The proliferation of organizations that choose not to pay ransomware scams around the ransomware has also led criminal gangs to change their tactics, as it shows an increase in hacking attacks where criminals threaten to leak stolen information if the victim does not pay.

According to Cover, these accounted for 70% of ransomware attacks in the last three months of 2020 – up from 50% in the previous three months.

However, while about three-quarters of the organizations threatened to publish information between July and September for the ransom, that dropped to 60% of the organizations that fell victim between October and December.

Investigators note that even if a ransom is paid, there is no guarantee that criminals will delete the data and instead use it for other malicious purposes, something that organizations might consider when deciding to pay.

As cybersecurity companies and law enforcement agencies warn, any payments made after a hacking attack incite criminals to continue their attacks.

Rhlengware also continues to be successful because cybercriminals can successfully break into insecure networks to lay the groundwork for attacks.

Phishing scams and Remote Desktop Protocol (RDP) emails are the most common forms of hacking to install networks.

While the email of identity theft relies on victims to open malicious documents or links to initiate attacks, the RDP does not require a person in the victim’s organization to be involved at all, as attackers can misuse leaked credentials.

In both cases, the virus finds a way to communicate because cybercriminals use security threats. Installing security clips to protect malicious criminals who use known vulnerabilities can help stop malware activity on the network.

Using tools such as two-factor authentication can help prevent attackers from gaining access to the network because even if they have the right login details, it is tough to exploit them.

In the meantime, it regularly renews offline backups and provides organizations that are victims of cyber attacks with a way to retrieve the network without rewarding criminals.

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This