Nearly half of security events in 2021 are connected to ransomware

Keyboard equipped with a red ransomware dollar button.

Kaspersky has revealed that nearly half of security incidents handled by its Global Emergency Response Team (GERT) from January to November 2021 were connected to ransomware, an increase of nearly 9% from 2020. The trend prompted Kaspersky to name ransomware the Story of the Year, headlining its annual Kaspersky Security Bulletin series of predictions and analysis of key changes in the world of cybersecurity.

This year, ransomware took down gas pipelines and government health services. Ransomware operators refined their arsenals, focusing on fewer attacks against large-scale organizations, and an entire underground ecosystem has appeared to support ransomware gangs’ efforts.

Over the first 11 months in 2021, the percentage of ransomware-related IR requests processed by Kaspersky’s GERT team was 46.7%, a jump from 37.9% for all of 2020 and 34% for 2019.

Kaspersky’s Global Emergency Response Team is called in by companies after a security breach to limit the damage and prevent an attack from spreading. This is known as incident response (IR) and is reserved for mid-sized to large organizations.

Government and industrial sectors  most common targets
The most common targets were those in the government and industrial sectors. Together, attacks against those two industries accounted for nearly 50% of all ransomware-related IR requests in 2021. Other popular targets included IT and financial institutions.

Trend 2022
Meanwhile, as ransomware operators have shifted to bigger ransom demands and more high-profile targets, they’ve been facing increasing pressure from politicians and law enforcement agencies – making efficiency of attacks critical.
Kaspersky experts note two important trends that will gain popularity in 2022. First, ransomware gangs are likely to construct Linux builds of ransomware to maximize their attack surface. This is something that has already been seen with groups like RansomExx and DarkSide. In addition, ransomware operators will start to focus more on “financial blackmail.” This is when operators threaten to leak critical information about companies when they are undergoing critical financial events, such as conducting a merger or acquisition, or making plans to go public. When companies are in such a vulnerable financial state, they’re more likely to pay the ransom.

“We began talking about so-called Ransomware 2.0 in 2020, and what we’ve been seeing in 2021 is this new era of ransomware coming into full force,” said Vladimir Kuskov, head of threat exploration at Kaspersky. “Ransomware operators aren’t just encrypting data; they’re stealing it from critical, large-scale targets and threatening to expose the information if the victims doesn’t pay. And Ransomware 2.0 is going anywhere in the coming year.”

Related posts

IceWarp Commands 60% Market Share in India’s Top Pharmaceutical & Healthcare Sector for its Enterprise Email and Collaboration Solutions

Google Gemini’s Deep Research Feature Now Live in 9 Indian Languages

Team Computers & HP Unveil The Future of High-performance Computing at The HP Z Series Event

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More