DOLAR 38,0646 0.34%
EURO 43,1107 1.15%
ALTIN 3.944,761,90
BITCOIN 31513185.36122%
İstanbul

PARÇALI AZ BULUTLU

20:52

YATSIYA KALAN SÜRE

Resim Yükle
Resim Yükle
120x600_gif.gif
Addressing the Persistent Threat of Ransomware

Addressing the Persistent Threat of Ransomware

ABONE OL
Nisan 1, 2025 18:57
Addressing the Persistent Threat of Ransomware
0

BEĞENDİM

ABONE OL

Tackling Ransomware: An Ongoing Organizational Challenge

Ransomware continues to pose a formidable threat to organizations, as cybercriminal activity persists unabated. Recent reports from the cyber insurance sector highlight the escalating menace, urging companies to intensify their defense strategies.

The modus operandi of ransomware attacks typically involves a threat actor infiltrating an organization’s system, seizing control of sensitive data, and then extorting payment under the threat of public disclosure. This has been a significant concern, especially over the past five years.

Rising Ransomware Group Activities

Data from a study by Travelers Cos. Inc. reveals a staggering 67% surge in the emergence of new ransomware groups last year. The final quarter witnessed the most intense leak site activity in over a year, according to Lauren Winchester, the Philadelphia-based head of cyber risk services at the insurer.

Resim Yükle

“Our analysis of ransomware leak site activities shows a consistent quarterly rise, with Q4 of 2024 witnessing a 32% increase over the previous quarter. It marked the highest leak site activity in 15 months, affecting nearly 1,700 companies,” noted Ms. Winchester. The activation of ransomware groups on leak sites has also seen a rise over the past year, she added.

Resim Yükle

Forecasts and Initial Access Vectors

In a March report, cyber insurer Coalition Inc. predicted that over 45,000 software vulnerabilities would be published this year. The most prevalent initial access methods for ransomware claims in 2024 were stolen credentials at 47%, followed by software exploitation at 29%.

İlgili Haber  Cowbell Expands Cyber Risk Assessment with New Integrations

“This issue is not fading away,” remarked Daniel Woods, a senior security researcher for Coalition based in Edinburgh, Scotland, who also lectures at the University of Edinburgh. In some instances, a security breach can extend its impact beyond the primary target, affecting ancillary victims.

“The repercussions ripple through society… It’s not merely one company suffering in some scenarios,” Mr. Woods explained.

Defensive Measures Against Ransomware

Defensive Measures Against Ransomware

Organizations can deploy several defenses against these attacks. Brute force attacks, where a threat actor attempts to breach a data system by randomly guessing passwords, can be thwarted by adopting multifactor authentication, which adds an extra verification step post-password. However, Mr. Woods cautions that this must be correctly implemented at suitable system points for efficacy.

Implementing controls like multifactor authentication can entail a significant financial outlay, potentially recurring if a business licenses a software product, according to Gwenn E. Cujdik, Exton, Pennsylvania-based manager of North American cyber incident response and cyber services for Axa XL. These costs can often exceed the means of small to medium-sized enterprises, she noted.

Training programs are also effective, Ms. Cujdik said. “Helping your employees better identify phishing attacks and developing policies and procedures for technology application software usage can significantly mitigate cyber exposures,” she explained. “These policies and procedures are not expensive.”

The initial step should be to recognize and comprehend the exposure, which not all businesses have done, Ms. Cujdik added. “From small enterprises to large corporations, some have convinced themselves that they don’t require cyber insurance,” she stated.

Technological Tools and Strategies

Endpoint detection and response is another technology tool that can aid businesses in combating ransomware, according to Ms. Winchester. By monitoring each user or endpoint on a network for suspicious activity, this technology can trigger alerts and help contain the progression of any breach incident or “minimize the blast radius,” she said.

İlgili Haber  Swiss Re Corporate Solutions Appoints New Global Head of Risk Engineering Services

Scanning for unprotected network elements that could be easily exploited can also assist organizations in mitigating ransomware threats, Ms. Winchester advised.

Resim Yükle

En az 10 karakter gerekli

Veri politikasındaki amaçlarla sınırlı ve mevzuata uygun şekilde çerez konumlandırmaktayız. Detaylar için veri politikamızı inceleyebilirsiniz.