According to recent research from Trend Micro, targeted ransomware attacks are increasing in frequency as more businesses switch to Linux systems.
Trend Micro claims that in the first half of 2022 alone, 63 billion threats were stopped by the company's systems, a huge 52% increase from the same time in 2021.
Companies are integrating several malware tools to combat unwanted attacks in an effort to ensure that they are fully protected, but Trend Micro is worried that "threat actors are able to weaponize these defects faster than suppliers can issue patch patches."
ransomware assaults on Linux
Government, industry, and the healthcare industries are of particular interest to cyberattackers, according to Trend Micro.
Small and medium-sized businesses (SMBs) have been under increased pressure in the fight for better cybersecurity, even if huge corporations that store vast amounts of sensitive information continue to be a prominent target in these attacks.
One of the most notable attacks in the first half of 2022, according to Trend Micro, was "Black Basta," which had an impact on 50 companies in just two months.
Along with the misuse of cloud tunnelling services and cloud-based crypto mining that has become a staple of ransomware operations, threat actors are allegedly also exploiting misconfigured setups.
Trend Micro's vice president of threat intelligence, Jon Clay, stated that "new and emerging threat groups continue to adapt their business model, targeting their attacks with increasingly more accuracy."
On their frequently "growing digital attack surface[s]," Clay recommended businesses to better understand their risks and to continue investing in services like endpoint protection.
Technical Director Bharat Mistry provided the following recommendations when we asked Trend Micro for the best tips on securing your business:
New varieties of RaaS groups and emerging threat actors continue to pose a threat to organisations online. The rapidly evolving threat landscape necessitates a more integrated approach that focuses on attack surface management to enable quicker response times, improved visibility, risk mitigation, and more as more enterprises continue to transition to cloud and hybrid cloud environments.
Want to remain secure? The top malware eradication tools are listed below.