Cybersecurity officials from Australia, Canada, and the United States have issued a joint warning about an increase in ransomware attacks that target critical infrastructure organisations around the globe in 2021..
The incidents targeted a wide range of sectors including defence, emergency services and agriculture.
“Ransomware tactics and techniques continued to evolve in 2021, which demonstrates ransomware threat actors’ growing technological sophistication and an increased ransomware threat to organizations globally,” the agencies said in the joint bulletin.
Spear-phishing, stolen or brute-forced Remote Desktop Protocol (RDP) credentials, and exploitation of software flaws emerged as the top three initial infection vectors that were used to deploy ransomware on compromised networks, even as the criminal business model morphed into a “professional” market dominated by different groups of players to gain initial access, negotiate payments, and settle payment disputes.
But in a noticeable shift in the wake of highly-publicized attacks on Colonial Pipeline, JBS, and Kaseya last year, ransomware actors pivoted away from “big-game” hunting in the U.S. in the second half of 2021 to focus on mid-sized victims and evade scrutiny from law enforcement.
“After encrypting victim networks, ransomware threat actors increasingly used ‘triple extortion’ by threatening to (1) publicly release stolen sensitive information, (2) disrupt the victim’s internet access, and/or (3) inform the victim’s partners, shareholders, or suppliers about the incident,” the agencies said.
According to a new report published by Syhunt this week, over 150 terabytes of data has been stolen from victim organizations by ransomware groups from January 2019 up to January 2022, with REvil alone accounting for 44. 1TB of the total stolen information the group siphoned from 282 victims.
Among other tactics embraced by ransomware groups to maximize impact include striking cloud infrastructures to exploit known weaknesses, breaching managed service providers (MSPs) to access multiple victims through one initial compromise, deploying code designed to sabotage industrial processes, poisoning the software supply chain, and conducting attacks during holidays and weekends.
To reduce and mitigate the impact of ransomware attack, organisations are being asked to —
- Keep all operating systems and software up to date,
- Limit access to resources over internal networks, especially by restricting RDP and using virtual desktop infrastructure,
- Raise awareness among users about the risks of phishing,
- Mandate strong, unique passwords and multi-factor authentication to protect accounts from takeover attacks,
- Encrypt data in the cloud,
- Implement network segmentation,
- Disable unnecessary command-line utilities, and restrict scripting activities and permissions,
- Enforce time-based access for privileged accounts, and
- Maintain offline (i.e., physically disconnected) backups of data
“Criminal activity is motivated by financial gain, so paying a ransom may embolden adversaries to target additional organizations or encourage cyber criminals to engage in the distribution of ransomware,” the agencies cautioned. The ransom payment does not guarantee the victim’s files can be recovered. It will also help to disrupt ransomware’s criminal model by reducing ransomware threat actor’s financial gains. “