IT disaster recovery, cloud computing and information security news

Threat actors are weaponizing cloud storage and using advanced cloud-based tools to create record ransomware attack effectiveness and volume, according to the 2021 SonicWall Cyber Threat Report. Work-from-home pandemic business continuity response has resulted in an unprecedented change for organizations as they fight to defend exponentially greater attack surfaces from cybercriminals armed with powerful cloud-based tools, cloud storage and endless targets. As working environments have evolved, so have the methods of threat actors and other motivated perpetrators.

“2020 offered a perfect storm for cybercriminals and a critical tipping point for the cyber arms race,” said SonicWall President and CEO Bill Conner. “The pandemic - along with remote work, a charged political climate, record prices of cryptocurrency, and threat actors weaponizing cloud storage and tools - drove the effectiveness and volume of cyber attacks to new highs. This latest threat intelligence offers a look at how cybercriminals shifted and refined their tactics, painting a picture of what they are doing amid the uncertain future that lies ahead.”

The 2021 SonicWall Cyber Threat Report highlights how COVID-19 provided threat actors with ample opportunity for more powerful, aggressive and numerous attacks, thriving on the fear and uncertainty of remote and mobile workforces navigating corporate networks from home.

“There is no code of conduct when it comes to cybercriminals, their methods of attacks and the selection of their targets,” said Conner. “Technology is moving at an unprecedented rate. Threats that were once thought to be two or three years away are now a reality, with do-it-yourself, cloud-based tools, creating an army of cybercriminals armed with the same devastating force and impact of a nation-state or larger criminal enterprise. Organizations must remain vigilant and proactive in hardening their cyber security posture.”

Major findings in the SonicWall report include:

Ransomware reaches new heights with increasingly targeted attacks: a 62 percent increase in ransomware globally, and 158 percent spike in North America, points to cybercriminals using more sophisticated tactics and more dangerous variants, like Ryuk, to earn an easy payday.

Ryuk ransomware rises from obscurity, sees astronomical increase: first identified in August 2018, Ryuk did not appear outside of North America, Europe, or Asia as late as January 2020. The following month, Ryuk began climbing the charts, eventually overtaking top-ranking Cerber ransomware. With 109.9 million cases detected worldwide, Ryuk was logged nearly every eight seconds in September alone.

More ‘never-before-seen’ malware variants identified: SonicWall’s newly patented Real-Time Deep Memory Inspection™ (RTDMI), a component of the company’s Capture Advanced Threat Protection (ATP) sandbox service, discovered 268,362 ‘never-before-seen’ malware variants in 2020, a 74 percent year-over-year increase.

Malicious Office files surpass the previous year’s preferred PDFs:
SonicWall research shows the shift to employees working from home full-time could be directly linked to the increased utilization of Office files and PDFs as malicious vehicles armed with phishing URLs, embedded malicious files and other dangerous exploits. New SonicWall data indicates a 67 percent increase in malicious Office files in 2020, while malicious PDFs dropped 22 percent.

Cryptojacking returns as cryptocurrency breaks records: once thought to be a dying attack vector after the industry’s major mining operation boarded its online service, cryptojacking is back thanks to rising cryptocurrency values and its appeal of concealed payouts. Total cryptojacking for 2020 set records with 81.9 million hits, a 28 percent increase from last year’s 64.1 million total.

IoT malware increases as pandemic creates potential network of disruption: in March 2020, masses of employees packed their personal office belongings and equipment to work from home for months on end, simultaneously creating an explosion of new attack vectors. In 2020, SonicWall Capture Labs threat researchers recorded 56.9 million IoT malware attempts, a 66 percent increase that showed shifting tactics for lurking cybercriminals.

Intrusion attempts up as attack patterns change: the distribution of intrusion attacks took on an entirely new character as a result of the changes brought on by the pandemic. In 2020, Directory Traversal tactics (34 percent) took over the top spot after a tie with remote code execution (21 percent for both) in 2019.

Retail, healthcare and government face mounting ransomware volume: industry-specific ransomware data reflects the impact cybercriminals had on retail (365 percent), healthcare (123 percent) and government (21 percent) sectors over the course of the pandemic.

More details.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.