Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    2024 Was a Record-Breaking Year For Ransomware

    2024 saw the highest-ever amount of ransomware attacks, according to a new report from NCC Group.

    There were 5,263 observed ransomware incidents last year, with the LockBit gang accounting for ten percent (526) of these attacks. RansomHub was the second most active group, accounting for 501 attacks.

    Notably, the industrial sector was the most commonly targeted, accounting for 27% of ransomware attacks in 2024 (a 15% increase from 2023). The researchers note, “Attacks in the sector have caused mass disruption, affecting critical infrastructure and services and causing material downtime.”

    NCC Group predicts that this increase will continue through 2025, as threat actors incorporate AI tools to improve efficiency.

    “In 2025, we expect to see a continued increase in attack numbers, in line with the incline observed since 2021,” the researchers write. “Attacks are highly likely to be directed at sectors like industrials, who have historically been vulnerable to ransomware attacks. Law enforcement operations will continue to target major operators.

    However, the thriving RaaS ecosystem will allow affiliates to easily change their operator and continue conducting attacks under a different ransom group name. Growing use of AI and machine learning to assist with attacks, and defence strategies will significantly reshape the cyber security landscape.”

    The researchers note that awareness training can provide a necessary layer of defense against ransomware attacks, since threat actors often gain initial access via social engineering.

    “Ransomware persists in the threat landscape, and this is reflected not only by this case study but also in NCC Group’s Threat Intelligence Team’s coverage of ransomware,” the report says. “Both reflect the persistent threat and the importance of implementing sufficient mitigations for a robust defence. These stretch from phishing training and awareness, a common initial access vector to ransomware attacks, to network segmentation to prevent the spread of the ransomware across the estate.”

    KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.

    NCC Group has the story.

     Return To KnowBe4 Security Blog

    Discover dangerous look-alike domains that could be used against you! 

    Since look-alike domains are a dangerous vector for phishing attacks, it’s top priority that you monitor for potentially harmful domains that can spoof your domain.

    Our Domain Doppelgänger tool makes it easy for you to identify your potential “evil domain twins” and combines the search, discovery, reporting, risk indicators, and end-user assessment with training so you can take action now.

    Here’s how it’s done:

    • Get detailed results of look-alike domains found similar to your primary email domain
    • You can now quiz your users with your look-alike results
    • Get a summary PDF that contains an overview of the look-alike domains and associated risk levels discovered during the analysis
    • It only takes a few minutes to discover your “evil domain twins”!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Get Ransim Here!


    Sign Up to the TIO Intel Alerts!

    Back To Top