The Rise of Ransomware 2.0 Worldwide

Naija Tech News (NTN) on 15, and in content, The Rise of Ransomware 2.0 Worldwide, Ransomware, Ransomware 2.0 .

The Rise of Ransomware 2.0 Worldwide: cybercriminals change focus from encrypting data to publishing confidential information online.

What is ransomware?

Since this is a quiet lengthy article, we have added a table of contents for easier navigation.

Ransomware is one of the biggest security problems on the internet and one of the biggest forms of cybercrime that organizations face today. Ransomware is a form of malicious software that encrypts files and documents on anything from a single PC all the way up to an entire network, including servers. Victims can often be left with few choices; they can either regain access to their encrypted network by paying a ransom to the criminals behind the ransomware, or restore from backups or hope that there is a decryption key freely available.

The Rise of Ransomware 2.0

The Rise of Ransomware 2.0 Worldwide

Over the past couple of years, widespread ransomware attacks—where criminals use malware to encrypt your data and hold it for ransom—have been replaced by more targeted attacks against specific companies and industries. In these more targeted campaigns, attackers don’t only threaten to encrypt data but publish confidential information online. This trend was observed by Kaspersky researchers in a recent analysis of two notable ransomware families: Ragnar Locker and Egregor.


Ransomware attacks, in general, are considered one of the more serious types of threats facing companies. Not only can they disrupt critical business operations, but they can also lead to massive financial losses and, in some cases, even bankruptcy due to fines and lawsuits incurred as a result of violating laws and regulations.

For example, the WannaCry attacks are estimated to have caused more than $4 billion in financial losses. However, newer ransomware campaigns are modifying their modus operandi: they’re threatening to take stolen company information public.

Ragnar Locker and Egregor are two well-known ransomware families practicing this new method of extortion.

The Rise of Ransomware 2.0 Worldwide

Ragnar Locker was first discovered in 2019, but it didn’t become well-known until the first half of 2020 when it was seen attacking large organizations. Attacks are highly targeted with each sample specifically tailored to the intended victim, and those who refuse to pay have their confidential data published in the “Wall of Shame” section of their leaks site. If the victim chats with the attackers and then refuses to pay, this chat is also published. The primary targets are companies in the United States across different industries. This past July, Ragnar Locker stated that it had joined the Maze ransomware cartel, meaning the two will share stolen information and collaborate. Maze has become one of the most notorious ransomware families in 2020.

Egregor is much newer than Ragnar Locker—it was first discovered this past September. However, it uses many of the same tactics, and it also shares code similarities with Maze. The malware is typically dropped by breaching the network, once the target’s data has been exfiltrated, gives the victim 72 hours to pay the ransom before the stolen information goes public. If the victims refuse to pay, the attackers publish the names of the victims and links to download the confidential company data on their leaks site.

Egregor’s attack radius is much more extensive than Ragnar Locker’s. It’s been seen targeting victims across North America, Europe, and parts of the APAC region.

“What we’re seeing right now is the rise of ransomware 2.0. By that I mean, attacks are becoming highly targeted and the focus isn’t just on encryption; instead, the extortion process is based around publishing confidential data online. Doing so puts not just companies’ reputations at risk, but also opens them up to lawsuits if the published data violates regulations like HIPAA or GDPR. There’s more at stake than just financial losses,” comments Dmitry Bestuzhev, head of the Latin American Global Research and Analysis Team (GReAT).

“This means organizations need to think about the ransomware threat as more than just a type of malware. In fact, often times, the ransomware is only the final stage of a network breach. By the time the ransomware is actually deployed, the attacker has already carried out a network reconnaissance, identified the confidential data and exfiltrated it. It’s important that organizations implement the whole range of cybersecurity best practices. Identifying the attack at an early stage, before attackers reach their final goal, can save a lot of money” adds Fedor Sinitsyn, security expert at Kaspersky.

How to stay Protected from Ransomware Attacks

To keep your company protected against these types of ransomware attacks, Kaspersky experts recommend:

  1. Do not expose remote desktop services (such as RDP) to public networks unless absolutely necessary and always use strong passwords for them.
  2. Always keep software updated on all the devices you use. To prevent ransomware from exploiting vulnerabilities, use tools that can automatically detect vulnerabilities, and download and install patches.
  3. Promptly install available patches for commercial VPN solutions providing access for remote employees and acting as gateways in your network.
  4. Treat email attachments, or messages from people you don’t know, with caution. If in doubt, don’t open it.
  5. Use solutions like Kaspersky Endpoint Detection and Response and Kaspersky Managed Detection and Response to identify and stop the attack at an early stage before attackers complete their objective.
  6. Focus your defense strategy on detecting lateral movements and data exfiltration to the Internet. Pay special attention to the outgoing traffic to detect cybercriminal’s connections. Back up data regularly. Make sure you can quickly access it in an emergency when needed.
  7. To protect the corporate environment, educate your employees. Dedicated training courses can help, such as the ones provided in the Kaspersky Automated Security Awareness Platform. A free lesson on how to protect from ransomware attacks is available here.
  8. For personal devices, use a reliable security solution like Kaspersky Security Cloud that protects against file-encrypting malware and rolls back the changes made by malicious applications.
  9. If you’re a business, enhance your protection with Kaspersky’s free Anti-Ransomware Tool for Business. Its recently updated version contains an exploit prevention feature to prevent ransomware and other threats from exploiting vulnerabilities in software and applications. It is also helpful for customers that use Windows 7: with the end of support for Windows 7, new vulnerabilities in this system won’t be patched by the developer.
  10. For superior protection, use an endpoint security solution, such as Integrated Endpoint Security, that is powered by exploit prevention, behavior detection, and a remediation engine that is able to roll back malicious actions
DOWNLOAD Our Mobile App

If you think this post can be helpful to somebody else, please share it on Twitter, Facebook or Whatsapp it to friends. There are buttons below for this (easy to use too)! Join Over 5,000 + Readers. Get a free daily update via Email HERE

For the latest tech news across the world, latest PC and Mobile games, tips & tricks, top-notch gadget reviews of most exciting releases follow Naijatechnews' FacebookTwitter, Instagram & Telegram. Subscribe our Google News, & YouTube Cannel.


Download Netify VPN Apk 2019 For Android 1

Click to comment ❤️

Leave a Reply

3 × 3 =

Note: off comments will be trashed and you will be marked as Spam! use contact us, if it's required.


Copyright © 2020 Naijatechnews. All rights reserved.Technology is developing very rapidly. We’ll keep you posted on all the latest news in technology and lifestyle. Spread the word!

To Top