Ransomware Overview

Frequency of Automated attacks on infrastructure

One of my clients ran a test to see how many cyber attacks they were preventing. They looked at the number of incoming packets that were rejected by their firewalls, or which api calls failed, for one of their internet facing B2B systems. The numbers came out to roughly 6 attacks per second, or 500,000 per day. When we looked a little deeper, we could see that most of these were automated scanning of the site - the first step for most external attacks. I'm sure there were some malformed API requests mixed in too, but these were few and far between as far as we could tell. To a first approximation, these numbers appeared accurate.

These measurements didn't take into account any attempted business email compromise or other attempts to inject malware into their corporate network, such as by Phishing, Spear-Phishing, or other methods that more or less attack their staff directly. The 6 attacks per second numbers were simply for the input to their B2B cloud that their customers use every day. And it's not a widely known/publicized cloud location.

Ransomware attacks

Ransomware includes all sorts of different 'strategies' employed by the attackers. Today, many of these include multiple forms of extortion. Over the last few years, we've seen a rise in criminal 'enterprises', and even specialization among these criminal groups. Many of these groups now also have "support" arms, often 2 different ones - one for the other criminal elements who wish to create the attacks, and another for those companies, municipalities, etc. who need help acquiring untraceable cyber-currency to pay off the extortion. Many of these groups operate in countries where this kind of 'business' is not recognized as criminal. The attackers view this as a job, and their 'business day' is one factor experts can use in working to identify which group is behind a given attack.

Types of Cyber-Extortion

Most attacks are based on the attacker getting access to your data, or around bringing your systems to their knees:

The extortion component of an attack can start out with a simple "We've encrypted your data, pay us $, and we'll give you the key". But if you don't pay, then they may start layering on further extortion elements. For example, the second level of extortion they may threaten to tell your customers that their data has been extracted/breached. Then they may threaten to 'go public' with enough of your data to prove to the world they have it.

Common extortion avenues include:

I've seen reports of up to seven different types of extortion in use by some attackers.

Closing thoughts

It should be noted that, given that these are mostly criminal enterprises doing the attacking, they've realized that they need to follow through on their promise to help you decrypt your data. If they don't, people will stop paying. Evidence indicates that most attackers do what they've promised if you pay the ransom.

And, it's estimated that many attacks, across all attack types, including ransomware attacks where the company does pay the ransom, are being under reported. The Internet Crime Center, part of the FBI, calculated that the reported ransomware and other cybercrime accounted for losses in the US of $12.3 Billion in 2023 alone. That represents a 22% increase is losses over 2022. Of these numbers, in 2023, business email compromise accounted for $2.9 billion, and ransomware $59.6 Million. The others were personal attacks (investment fraud, customer support scams and elder attacks). Ransomware, specifically, did take a small dip in 2022, but it was back on the rise in 2023. There is speculation, but little evidence that this is due to companies paying the ransom and then not reporting it.

Finally, there is some evidence that if you've been hit once by a ransomware group, you're likely to be a target again. The attackers know you'll be ready immediately after the first attack, but suspect you'll let your guard down over time. Plan on stepping up security, and then keeping it tight, permanently, after any attack. Better yet, simply assume you're already under attack, and keep your defenses in a high state of readiness before you can suffer a successful attack.

By Craig Payne