Attack Trends in 2020 - A Boom in Double-Extortion Ransomware

Attack Trends in 2020 - A Boom in Double-Extortion Ransomware

F-Secure’s Attack Landscape Update report has revealed that, in 2020, double-extortion ransomware attacks increased drastically. Using this tactic, threat actors not only encrypt files but steal data from organizations. Later, this stolen data is used as leverage to pressurize victims into paying the ransom, or else their data gets leaked online.

What’s in the report?


Last year, 15 ransomware families used the double-extortion approach, in comparison to only one in 2019. In addition, around 40% of newly discovered ransomware families utilized the tactic in 2020.
Maze ransomware was the first malware that started the trend of double-extortion in late 2019. By the end of 2020, this tactic was being used by several other ransomware families.
Some of the major active ransomware families using double-extortion techniques include Doppelpaymer, Conti, Clop, Ragnar Locker, and ChaCha.

Common infection vectors


One of the most common infection vectors in 2020 was email attack, responsible for over half of all malware infection attempts.
The use of Excel formulas to obfuscate malicious code saw a three-fold increase in the second half of 2020.
The most popular brands used for email spoofing were Outlook, Office365, and Facebook Inc. Moreover, web hosting services were responsible for three-quarters of domains used to host phishing pages.

Other trends observed in the report


Additionally, the report highlighted other significant cybersecurity trends observed in 2020.
The two most prominent malware families in the latter half of 2 ..

Support the originator by clicking the read the rest link below.