Despite REvil (opens in new tab) and some of the other most notorious ransomware gangs (opens in new tab) being shut down this year, the cybercriminals behind them have continued to develop and succeed with new cross-platform capabilities, updated business processes and more.
Over the past few years, ransomware (opens in new tab) operations have grown from their clandestine and amateur beginnings to become fully-fledged businesses with distinctive brands and styles that rival each other on the dark web (opens in new tab). To raise awareness in advance of Anti-Ransomware Day, the cybersecurity firm Kaspersky (opens in new tab) has released a new report highlighting some of the new ransomware trends spotted so far this year.
Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022 (opens in new tab). Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey (opens in new tab) to get the bookazine, worth $10.99/£10.99.
The first trend of note is the abundant use of cross-platform capabilities by ransomware groups which allow them to damage as many systems as possible using the same malware (opens in new tab) by writing code that can be executed on multiple systems at once. Conti (opens in new tab) has been one of the most active groups this year and it developed a variant of its ransomware that can be distributed through select affiliates and targets devices running Linux distros (opens in new tab) as well as Windows machines.
At the same time, ransomware groups have continued activities to facilitate their business processes. These activities include rebranding to divert the attention of law enforcement as well as updating exfiltration tools. Meanwhile some groups have developed and implemented their own custom and complete toolkits which resemble those put out by legitimate software companies. The Lockbit (opens in new tab) ransomware group stands out for this as the organization provides regular updates for its toolkits and often applies repairs to its infrastructure.
Ever since Russia’s invasion of neighboring Ukraine (opens in new tab) began on February 24, it has led businesses, governments and individuals to take sides regarding the conflict.
According to Kaspersky though, this was also the case on cybercrime forums (opens in new tab) and with ransomware groups who began taking sides. As a result, there were a number of politically motivated attacks during Q1 of this year which cybercriminals carried out either in support of Russia or Ukraine.
> REvil ransomware group is back with a vengeance (opens in new tab)
> Microsoft wants to try and kill off ransomware for good (opens in new tab)
> IT workers believe ransomware is as serious as terrorism (opens in new tab)
One of the new malware strains that was discovered during the conflict is named Freeud and it was developed by Ukraine supporters. Instead of encrypting the systems of its targets, Freud features wiping functionality and if a target contains any items from a list of files, the malware wipes them from a victim’s system.
Senior security researcher at Kaspersky’s global research and analysis team, Dmitry Galov provided further insight on the company’s New Ransomware Trends in 2022 (opens in new tab) report in a press release (opens in new tab), saying:
“If last year we said ransomware is flourishing, this year it’s in full bloom. Although major ransomware groups from last year were forced to quit, new actors have popped up with never before seen techniques. Nevertheless, as ransomware threats evolve and expand, both technologically and geographically, they become more predictable, which helps us to better detect and defend against them."
- Protect all of the devices on your network with one of the best firewalls (opens in new tab)