"Ransomware builders are focusing on speed and performance. Instead encrypting the entire file, a portion of the file is getting targeted for encryption to save time. Multithreading is getting leveraged for faster encryption and decryption of files," the report mentioned
Most of the ransomware groups are exploiting known vulnerabilities for which patches are available. Some of the product-wise vulnerabilities being exploited are in tech companies like Microsoft, Citrix, Fortinet, SonicWall, Sophos, Zoho, and Palo Alto etc, said the report. Image Courtesy: iStock
In its latest report, India's national cyber agency CERT-In said India saw a 53 per cent increase in ransomware incidents in 2022 (year-over-year) and IT and ITeS was the majorly impacted sector followed by finance and manufacturing. Ransomware players targeted critical infrastructure organisations and disrupted critical services in order to pressurise and extract ransom payments in 2022, according to the "India Ransomware Report 2022".
ADVERTISEMENT
"Variant wise, Lockbit was a majorly seen variant in the Indian context followed by Makop and DJVU/Stop ransomware. Many new variants were observed in 2022 such as Vice society, BlueSky etc," said CERT-In. Last year, a massive ransomware attack disrupted the systems at the All India Institute of Medical Science (AIIMS), crippling its centralised records and other hospital services.
According to the CERT-In report, at the large enterprise level, Lockbit, Hive and ALPHV/BlackCat, Black Basta variants became major threats, whereas Conti, which was very active in the year 2021, became extinct in the first half of the year 2022. "Makop and Phobos ransomware families mainly targeted medium and small organisations. At the individual level, Djvu/Stop variants continued dominance in attacks over the past few years," the report said.
Most of the ransomware groups are exploiting known vulnerabilities for which patches are available. Some of the product-wise vulnerabilities being exploited are in tech companies like Microsoft, Citrix, Fortinet, SonicWall, Sophos, Zoho, and Palo Alto etc, said the report. "Ransomware gangs are commonly using Microsoft Sysinternals utilities such as PsExec for lateral movements," it added.
On average, the restoration time is about 10 days for infections in reasonably large infrastructure networks. "For smaller networks/infrastructure, the restoration time is around 3 days and for individual systems, it is 1 day," the CERT-In report noted. Ransomware gangs are becoming innovative in their approach to improve attack operational efficiency.
"Ransomware builders are focusing on speed and performance. Instead of encrypting the entire file, a portion of the file is getting targeted for encryption to save time. Multithreading is getting leveraged for faster encryption and decryption of files," the report mentioned.
Also Read: 5 tech tools women must have to stay safe from cyber harassment
This story has been sourced from a third party syndicated feed, agencies. Mid-day accepts no responsibility or liability for its dependability, trustworthiness, reliability and data of the text. Mid-day management/mid-day.com reserves the sole right to alter, delete or remove (without notice) the content in its absolute discretion for any reason whatsoever