Ransomware is being used as a precursor to physical war

Threat actors engaged in multiple ransomware attacks against targets in Ukraine, Poland, and other countries in the days and weeks leading...

Threat actors engaged in multiple ransomware attacks against targets in Ukraine, Poland, and other countries in the days and weeks leading up to the Russian invasion of Ukraine, new research has claimed.

According to Ivanti and Cyware, this was a  strategy in which ransomware was used as a precursor to physical war.

The company's report notes that we can expect to see this strategy being used to wage conflicts a lot more in the future, and is even developing right now in a "cyberwar" conflict between Iran and Albania.

Risk-based approach

The joint research effort also highlighted some alarming trends surrounding ransomware.

According to the report, ransomware grew almost fivefold (466%) since 2019. There are now at least 170 active malware strains being used to extort businesses for money, with the report identifying ten new ones - Black Basta, Hive, BianLian, BlueSky, Play, Deadbolt, H0lyGh0st, Lorenz, Maui, and NamPoHyu. 

There are now also at least 35 vulnerabilities associated with ransomware, together with 159 trending active exploits. However, with no concrete threat context, patching systems and mitigating vulnerability exposure is a lot harder than one might think. 

Threat actors are relying on 101 CVEs for their phishing attacks, although that's by no means their only attack vector. The report identified 323 current ransomware vulnerabilities, leading up to 57 endpoint takeover methods. 

For Srinivas Mukkamala, Chief Product Officer at Ivanti, now is the time to adopt a risk-based approach to vulnerability management. 

“This includes leveraging automation technologies that can correlate data from diverse sources (i.e., network scanners, internal and external vulnerability databases, and penetration tests), measure risk, provide early warning of weaponization, predict attacks, and prioritize remediation activities,” he said.

“Organizations that continue to rely on traditional vulnerability management practices, such as solely leveraging the NVD and other public databases to prioritize and patch vulnerabilities, will remain at high risk of cyberattack.”



from TechRadar - All the latest technology news https://ift.tt/Cj7uXl6
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,110,Video,5,XIAOMI,13,YouTube - 9to5Google,109,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Ransomware is being used as a precursor to physical war
Ransomware is being used as a precursor to physical war
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2022/10/ransomware-is-being-used-as-precursor.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2022/10/ransomware-is-being-used-as-precursor.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy