skip to Main Content

At The Identity Organisation, we're here to help!

Slide Get in Touch With Us We work closely with our clients to understand their goals and then help them develop their plans in accordance with their core requirements. Our success is our clients success. Get in touch with us to uncover and deliver on opportunities that build lasting value. How to find us The Identity Organisation Ltd
Mercury House
19-21 Chapel Street, Marlow,
Bucks, SL7 2HN
Contact Details +44 (0) 1628 308038
info@tidorg.com

Alternatively, fill in our contact form below and one of our consultants will be in touch.

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Ransomware Tops IBMs List of Most Observed Attack Types with Sodinokibi Maintaining the Lead

    Ransomware Tops IBMs List

    In a new report from IBM Security, we get the opportunity to see exactly what kinds of attacks are succeeding, where are they happening, how they’re getting in, and what are the results.

    Ransomware has been at the forefront of most cyber news stories of late – from the recent major attacks affecting oil, meat, and other critical services, to the evolution of attacks to now include “triple extortion”. And while we can only speculate what the future of ransomware will look like, it’s imperative that every organization keep their eyes fixed on the current state of attack in order to protect and respond to attacks, should they be experienced.

    In IBM Security’s latest report, the X-Force Threat Intelligence Index 2021, we get a glimpse into what the ransomware gangs have achieved, who’s most successful, and what tactics they’re using. This critical detail can provide needed insight into how to best fortify your organization’s network. According to the report:

    • Ransomware attacks were #1, involved in 23% of all cyber attacks (with data theft, server access, and BEC following at a distance)
    • REvil’s Sodinokibi ransomware dominated with 22% of all ransomware attacks
    • 58% of attacks occurred in the U.S.
    • 59% of ransomware attacks used a double extortion strategy (where data is exfiltrated and the threat to release is added to the ransom)
    • An estimated 21.6TB of data was exfiltrated
    • An estimated $123 million was profited by ransomware gangs in the last 12 months from these attacks

    These figures echo sentiments I’ve recently been covering on this blog, making the case that ransomware is quickly becoming (if it already hasn’t) the single largest threat to businesses today.

    According to IBM Security’s report, Phishing was the initial attack vector in 33% of all attacks, nearly tying with scan-and-exploit and credential theft all for first place. Because a lot of credential theft occurs via phishing attacks, it adds to the sentiment that organizations need to prop up needed protections against email-borne phishing attacks using Security Awareness Training to educate users on attacks that both seek to get the recipient victim to engage with an attachment (likely to install ransomware) or to provide login credentials as part of the process of viewing received content (used for credential theft).

    The ransomware problem won’t be going away any time soon. Whatever your current security stance, you need to make it stronger.


    Free Ransomware Simulator Tool

    Bad guys are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 20 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    RanSimScreen-1

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 21 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    close

    Sign Up to the TIO Intel Alerts!

    Back To Top