Ransomware groups will target smaller businesses in 2022 - report
Scrutiny from law enforcement is causing groups to change tack, says analyst
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Small businesses are being warned to prepare for a potential surge in ransomware attacks in 2022 as cyber criminals turn to campaigns that are less likely to draw coordinated action from law enforcement.
Cyber criminals are said to be adapting to increased pressure from police agencies that have launched a number of successful operations to dismantle criminal networks, according to an analysis by threat intelligence firm Analyst1, published today.
"Instead of going after the high-profile attacks, since the activity brings unwanted attention from the federal government, they will likely target smaller companies that will allow them to stay under the radar," said Chris Fiormonti, former intelligence community threat analyst and researcher with the company.
In a review of big-ticket ransomware activities for the year, Fiormonti noted increased scrutiny and efforts by western law enforcement to quash the more egregious groups.
This includes warnings from CISA and the FBI, including last month's advisories that ransomware attacks were likely to increase during the holiday season.
The US Treasury, which now treats ransomware with the same severity as terrorism, offered a $10m reward for information leading to the arrest of the BlackMatter group. Federal agencies also issued a joint alert that it had targeted critical infrastructure groups.
RELATED RESOURCE
Protecting every edge to make hackers’ jobs harder, not yours
How to support and secure hybrid architectures
Law enforcement has scored some significant wins, Fiormonti added, pointing to the disappearance of the BlackMatter group in November, and the disappearance of the REvil group in July, and again in October, following a multi-state effort. Europol also captured several REvil members last month.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Citing a paper by the company's chief security strategist, Fiormonti noted several direct links between ransomware groups and the Russian government, including the Business Club, Evilcorp, Silverfish, and Wizard Spider groups. While these groups primarily attack for profit, a change in targets from previous years fits Russian government targets, he said. A recent New York Times report said that some groups operate out of Moscow's Federation Tower East, a prestigious business address, with apparent impunity.
While the attacks might change direction, there is no sign that they will cease, Fiormonti added.
"Ransomware attacks will continue as long as they are profitable or until the core group of individuals that take safe haven in Russia are taken down or disrupted," he said.
Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing.
Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.
-
Tomorrow's fraud techniquesITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Met Office hails huge efficiency gains in first year of cloud supercomputing with Microsoft AzureNews In moving to the cloud, the Met Office has bolstered operational resilience and helped to deliver more accurate forecasts
-
Sectigo taps Clint Maddox to lead global field operationsReviews The appointment follows a year of strong momentum for the security vendor as it expands its global channel footprint
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
