CISA Ransomware report warns “triple threat” attacks still on the prowl
Though we may be stuck with endless COVID-19 scams and a gradual visible rise in all manner of cryptocurrency hijinks, the old school attacks are as perilous as ever; CISA, the Cybersecurity & Infrastructure Security Agency, have released their 2021 report detailing the increasing globalised threat of the ransomware menace.
It covers a lot of ground, but many of the main findings wonât come as any surprise to those dealing with attacksover the last few years. Some of the more familiar efforts in the attack pipeline include:
- Phishing and stolen RDP credentials used to break into networks and then fire up the ransomware cannon
- Moving away from âbig gameâ targets in order to go after much smaller ones. This keeps defenders with small security budgets on their toes, and also perhaps contributes to ransomware groups sailing under the radar. Nothing generates heat faster than major international attacks and lots of police involvement.
- Attacking Managed Service Providers (MSPs). This allows Ransomware authors to potentially take down several targets at once, should they manage to compromise the MSP.
Attacking the cloud is also popular. Not just because many instances of cloud applications are vulnerable to exploits, but also because a lot of businesses have their backups in the cloud, too. Your corporate backup plan in case of a ransomware attack wonât help if threat actors manage to encrypt all of the backups.
These are some of the techniques and strategies weâve all come to see and also expect. But what else are they getting up to?
The triple threat
One of the most interesting parts of the report is the shift in how ransomware authors demand money, and also how they receive it. The days of the standard âYour PCs are encrypted, give us X amount in Bitcoin or you donât get your files backâ are no longer how everyone does it. The CISA summary highlights a type of ransomware attack that’s been growing in popularity for a while now:
Diversifying approaches to extorting money. After encrypting victim networks, ransomware threat actors increasingly used âtriple extortionâ by threatening to (1) publicly release stolen sensitive information, (2) disrupt the victimâs internet access, and/or (3) inform the victimâs partners, shareholders, or suppliers about the incident. The [Australian Cyber Security Centre]continued to observe âdouble extortionâ incidents in which a threat actor uses a combination of encryption and data theft to pressure victims to pay ransom demands.
Not just regular extortion, or double extortion, but tripleextortion! Telling everyone how badly you got it wrong, doubling down on shame and embarrassment, is going to have an impact. Theyâre plugging into the fear of the âbig revealâ in a way that makes organisations fail to disclose ransomware incidents, or even wire fraud or anything else for that matter.
Ransomware authors in the driving seat
Triple threat extortion attempts featured heavily in the news halfway through last year. Any hopes they may have become a passing phase seem to be sadly mistaken.
As the years pass, so too does the threat escalation. Informing people and organisations you know, or work with, is one final insult. Itâs the sextortion panic technique applied to the business environment. Thereâs nothing to stop the ransomware authors from doing what they want after getting onto the network, so why not? Itâs win-win for them, which makes it essential to ensure they donât ever get that far.
There is no end to ransomware attacks, or the type of data leaked via double or triple threat extortion. Hereâs one such double-hitterfrom last Friday, and you can bet thereâs a lot more happening this very second. One wonders what the quadruple-threat ransom will bringâŠ