Story image

Ransomware was 2016's hottest ticket as attacks spiked to whopping 752%

13 Mar 17

2016 was a year of record cyber threats and ransomware spikes never seen before, according to Trend Micro’s TrendLabs 2016 Security Roundup report.

Ransomware has seen a 752% increase in use, resulting in $1 billion in losses for enterprises worldwide. 

The number of ransomware families have jumped from 29 to 247, and Trend Micro believes it is because ransomware is a highly profitable operation.

Security companies warn businesses not to pay ransom demands, they are still giving in and providing the criminals with a lucrative income.

A 752 percent increase in new ransomware families ultimately resulted in US$1 billion in losses for enterprises worldwide. 

“Ransomware is exploding and diversifying due to the ability for cybercriminals to not just threaten data encryption, but threaten inconvenience and potential damage,” explains Dr. Jon Oliver, data scientist and senior architect at Trend Micro. 

“Ransomware dominated the threat landscape in 2016, causing losses and immense business disruption across multiple industries. Enterprises must adopt multi-layered security solutions to optimally combat these threats that could attempt to penetrate corporate networks at any time,” he continues.

Trend Micro says that many of the new ransomware families are targeting file types specific to businesses. Those file types can include tax return files, website files, SQL files, CAD files, virtual desktop files and database files.

The company says that open source ransomware and ransomware-as-a-service (RaaS) are also helping to grow the number of ransomware families.

Hidden Tear and EDA2 were originally designed to be educational, but they have also been corrupted by criminals to target web servers and databases.

The report shows that spam accounts for 79% of ransomware vectors, with the most common entry point being email.

“Organizations should be able to utilize web and email gateway solutions. Possible ransomware threats can be prevented through effective monitoring of email traffic and filtering potentially unsafe URLs, attachments, and other malicious payloads,” the report says.

Business Email Compromise (BEC) scams also topped the threat list, averaging US$140,000 in losses for companies around the globe.

Trend Micro and the Zero Day Initiative (ZDI) also discovered 765 vulnerabilities in 2016. 678 were discovered through the Bug Bounty program.

Of those vulnerabilities, Apple saw a 145% increase, while Microsoft bugs dropped by 47%. Angler exploit kits dropped by 71%, which Trend Micro says was partly due to the arrest of the threat actors behind Angler.

“Throughout 2016 we witnessed threat actors extort companies and organisations for the sake of profitability and we don’t anticipate this trend slowing down. This research aims to educate enterprises on the threat tactics actively being used to compromise their data, and help companies adopt strategies to stay one step ahead and protect against potential attacks,” comments Ed Cabrera, Trend Micro’s CSO.

Banking Trojans and ATM malware attacks have diversified, gaining hold of personally identifiable information and credentials that can be used to access enterprise networks. 

JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.