According to a recent analysis from cybersecurity experts Acronis, ransomware remains the top danger to large and medium-sized enterprises.
According to research based on data from the company's Cyber Protection Operation Centers, an increase in attacks targeting both government organisations and private businesses of all kinds has been caused by an overly complicated IT and infrastructure.
The paper claims that excessive infrastructure and IT complexity has led to many firms using unpatched software for extended periods of time. This gives threat actors the ability to infect enterprise endpoints with malware of all kinds, steal sensitive data, encrypt it, and then demand money in exchange for the decryption key and in exchange for not disclosing the stolen material to the public.
beginning with phishing
Aside from software issues, threat actors are running multiple successful phishing attempts. In reality, over one-quarter (26.5%) of emails were sent to the user's inbox, and almost one percent of emails contain harmful links or files. In other words, email service providers didn't block them.
The success rate of ransomware assaults suggests that threat actors' hunger for such attacks is increasing. The Conti gang, according to the article, reportedly demanded a $10 million ransom from the Costa Rican government and afterwards released nearly 670 GB of stolen information. A different threat actor going by the name of Lapsus$ grabbed 1TB of data and exposed the login information for over 70,000 NVIDIA users. Later, 30GB of T-source Mobile's code were stolen by the organisation.
The U.S. government has also noticed the damage ransomware users are causing. Law enforcement was able to temporarily shut down REvil, a prominent ransomware provider at the time, following last year's attack on Colonial Pipeline, a significant oil pipeline in the United States. It now offers a $15 million reward for any information about Conti's top brass.
The VP of Cyber Protection Research at Acronis, Candid Wüest, stated that modern cyberthreats are continually changing and eluding conventional security methods. "Organizations of all sizes require a comprehensive strategy for cybersecurity that incorporates capabilities for vulnerability assessment, email security, and anti-malware. To rely on single-layered techniques and point solutions is no longer an option because cybercriminals are getting too skilled and attacks are having too severe an impact.
Utilize the best malware removal to eliminate viruses and malware.