Ransomware: from Entry to Ransom in Under 45 Minutes
Ransomware gangs are performing wide-ranging internet scans to find vulnerable systems and then accelerating attacks to just minutes to capitalize on COVID-19, Microsoft has warned.
Corporate VP of customer security and trust, Tom Burt, revealed the findings in a blog post introducing the firmâs Digital Defense Report yesterday.
He claimed that threat actors have ârapidly increased sophisticationâ over the past year, with ransomware the number one reason for Microsoft incident response between October 2019 and July 2020.
âAttackers have exploited the COVID-19 crisis to reduce their dwell time within a victimâs system â compromising, exfiltrating data and, in some cases, ransoming quickly â apparently believing that there would be an increased willingness to pay as a result of the outbreak. In some instances, cyber-criminals went from initial entry to ransoming the entire network in under 45 minutes,â Burt explained.
âAt the same time, we also see that human-operated ransomware gangs are performing massive, wide-ranging sweeps of the internet, searching for vulnerable entry points, as they âbankâ access â waiting for a time that is advantageous to their purpose.â
Attackers have also become more sophisticated in performing reconnaissance on high-value targets so that they appear to know when certain factors like holidays will reduce the victim organizationâs chances of patching, or otherwise hardening their networks.
Theyâre also aware of how billing cycles operate in certain industries, and thus when specific targets may be more willing to pay, Burt claimed.
In total, Microsoft blocked over 13 billion malicious and suspicious emails in 2019, over one billion of which contained phishing URLs. Phishing now comprises over 70% of attacks, although the volume of COVID-related threats has dropped significantly from a peak in March, it said.
This isnât the only threat to home workers: Microsoft said it also saw an increase in brute force attacks on enterprise accounts in the first half of the year and urged widespread use of multi-factor authentication (MFA).
Burt said nation-state actors have also been changing their tactics of late, shifting targets to healthcare providers and vaccine researchers, public policy think tanks and NGOs. Although each group has their preferred techniques, reconnaissance, credential harvesting, malware and virtual private network (VPN) exploits were most common over the past year, said Burt.
Weâre Beeso IT, how can we help?
Our expert team of engineers, consultants, solution architects and project managers work right alongside our clientâs internal IT teams â bringing their years of technical experience & competencies to your business on a need by need basis.
Wherever you require support, for whatever technology requirement. The Beeso IT team are on-hand locally as your global technology partner. If you are unsure of how secure your endpoints are, please contact the team today.
News source: https://www.infosecurity-magazine.com/
Share This!
MICROSOFT OFFICE 365
YOUR COMPLETE OFFICE IN THE CLOUD
Bringing together everyone's favourite productivity tools with the benefits of cloud-based communication and collaboration, Microsoft have developed a platform that is both technically & commercially-sound for businesses of any shape.