Dual Ransomware attack on organisation

The U.S. Federal Bureau of Investigation (FBI) is warning of a new trend of dual ransomware attacks targeting the same victims, at least since July 2023.

"During these attacks, cyber threat actors deployed two different ransomware variants against victim companies from the following variants: AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal," the FBI said in an alert. "Variants were deployed in various combinations. 

Two or More Ransomware Variants Impacting the Same 

Victims and Data Destruction Trends

Summary

The Federal Bureau of Investigation (FBI) is releasing this Private Industry Notification to 

highlight emerging ransomware trends and encourage organizations to implement the 

recommendations in the “Mitigations” section to reduce the likelihood and impact of incidents 

" This use of dual ransomware variants resulted in a combination of data encryption, exfiltration, and financial losses from ransom payments," the agency said. "Second ransomware attacks against an already compromised system could significantly harm victim entities."

Based on zscaler 

What Is Double Extortion Ransomware?

Double extortion ransomware is a type of cyberattack in which threat actors exfiltrate a victim’s sensitive data in addition to encrypting it, giving the criminal additional leverage to collect ransom payments. A typical ransomware attack will only encrypt a victim’s data. The additional threat of exfiltration makes this attack especially dangerous for organizations in all industries.

philosophy, cybersecurity teams should implement these policies to further reduce the attack surface and mitigate the ransomware threat:

  • Enforce a consistent security policy to prevent initial compromise. With a distributed workforce, it's important to implement a secure access service edge (SASE) architecture that provides authentication and enforces consistent security policy no matter where users are working.
  • Deploy inline data loss prevention. Prevent exfiltration of sensitive information and keep data leak sites to a minimum with trust-based data loss prevention tools and policies to thwart double extortion techniques.
  • Keep software and training up to date. Apply software security patches and conduct regular security awareness employee training to reduce vulnerabilities that can be exploited by cybercriminals.
  • Have a response plan. Prepare for the worst with cyber insurance, a data backup plan, and a response plan as part of your overall business continuity and disaster recovery program.

The Zscaler Zero Trust Exchange

Zscaler has the industry’s most comprehensive ransomware protection for your network and cloud, with protections across the ransomware attack sequence, including initial compromise, lateral movement, and data exfiltration.

Zscaler monitors 200 billion transactions per day during peak periods across its global platform, blocking threats and sharing threat intelligence with customers around the world to facilitate zero trust security. We partner with leading security providers to ensure you have coordinated visibility and response capabilities across your entire security eco system


What are the two 2 main types of ransomware?
In particular, two types of ransomware are very popular:
  • Locker ransomware. This type of malware blocks basic computer functions. ...
  • Crypto ransomware. The aim of crypto ransomware is to encrypt your important data, such as documents, pictures and videos, but not to interfere with basic computer functions.

How many ransomware attacks per second?
19 ransomware attacks
There are 1.7 million ransomware attacks every day which means every second 19 ransomware attacks. The first half of 2022 saw nearly 236.7 million ransomware attacks world-wide

What are the 2 types of ransomware and its function?
Unlike crypto-ransomware, Locker ransomware does not encrypt files. Instead goes one step further, and it locks the victim out of their device. In these types of attacks, cybercriminals will demand a ransom to unlock the device.

Why it is called ransomware?
Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline.


What is another name for ransomware?
Ransomware may also be referred to as a crypto-virus, crypto-Trojan or crypto sworn





Comments

Popular posts from this blog

July 2024 Patch Tuesday Unleashes a Torrent of Updates

CVE-2023-26369 Adobe acrobat update

US court holds Israeli spyware liable for hacking Meta’s WhatsApp