Ransomware groups will target smaller businesses in 2022 - report
Scrutiny from law enforcement is causing groups to change tack, says analyst
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Small businesses are being warned to prepare for a potential surge in ransomware attacks in 2022 as cyber criminals turn to campaigns that are less likely to draw coordinated action from law enforcement.
Cyber criminals are said to be adapting to increased pressure from police agencies that have launched a number of successful operations to dismantle criminal networks, according to an analysis by threat intelligence firm Analyst1, published today.
"Instead of going after the high-profile attacks, since the activity brings unwanted attention from the federal government, they will likely target smaller companies that will allow them to stay under the radar," said Chris Fiormonti, former intelligence community threat analyst and researcher with the company.
In a review of big-ticket ransomware activities for the year, Fiormonti noted increased scrutiny and efforts by western law enforcement to quash the more egregious groups.
This includes warnings from CISA and the FBI, including last month's advisories that ransomware attacks were likely to increase during the holiday season.
The US Treasury, which now treats ransomware with the same severity as terrorism, offered a $10m reward for information leading to the arrest of the BlackMatter group. Federal agencies also issued a joint alert that it had targeted critical infrastructure groups.
RELATED RESOURCE
Protecting every edge to make hackers’ jobs harder, not yours
How to support and secure hybrid architectures
Law enforcement has scored some significant wins, Fiormonti added, pointing to the disappearance of the BlackMatter group in November, and the disappearance of the REvil group in July, and again in October, following a multi-state effort. Europol also captured several REvil members last month.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Citing a paper by the company's chief security strategist, Fiormonti noted several direct links between ransomware groups and the Russian government, including the Business Club, Evilcorp, Silverfish, and Wizard Spider groups. While these groups primarily attack for profit, a change in targets from previous years fits Russian government targets, he said. A recent New York Times report said that some groups operate out of Moscow's Federation Tower East, a prestigious business address, with apparent impunity.
While the attacks might change direction, there is no sign that they will cease, Fiormonti added.
"Ransomware attacks will continue as long as they are profitable or until the core group of individuals that take safe haven in Russia are taken down or disrupted," he said.
Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing.
Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.
-
AWS CEO Matt Garman isn’t convinced AI spells the end of the software industryNews Software stocks have taken a beating in recent weeks, but AWS CEO Matt Garman has joined Nvidia's Jensen Huang and Databricks CEO Ali Ghodsi in pouring cold water on the AI-fueled hysteria.
-
Deepfake business risks are growingIn-depth As the risk of being targeted by deepfakes increases, what should businesses be looking out for?
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
US small businesses are fighting off a wave of cyber attacksNews While threats are rising, many small business owners are trying to manage the risk themselves
