Maze
Maze ransomware began attacking U.S. entities, such as the city of Pensacola, Fla., in 2019. According to an FBI advisory, Maze infiltrates systems via spam emails that gave the appearance of being from a government agency or security company. The actors behind Maze distinguished themselves by adding a new ultimatum to the business model: threatening to publish the data of victims who don’t pay ransom.
Ryuk
Cybersecurity experts think the actors behind the now-defunct ransomware GandCrab are also behind Ryuk, which first appeared in 2018 and quickly became one of the most virulent and damaging types operating. No shotgun approach for Ryuk, whose victims are specifically targeted for their assets. Its ransom demand is typically 10 times that of other ransomware types.
Sodinokibi/REvil
Sodinokibi, a ransomware as a service (RaaS), first appeared in April 2019, but famously rang in 2020 by infecting Travelex currency exchange on New Year’s Eve. In that case it exploited an unpatched security system, but it also infiltrates through phishing attacks. Other victims have included a New York airport and government agencies throughout the state of Texas. In July 2021, REvil targeted managed service providers (MSPs), including IBM and Accenture, via a breach in Kaseya VSA’s software.
PureLocker
Phishing is still a top method of attack for ransomware, but PureLocker, a sophisticated new variant, operates far more proactively, using a type of backdoor malware to infect compromised Windows- or Linux-based production servers, where it strategically encrypts data. Cybersecurity experts suspect that PureLocker is a service hired exclusively by well-financed criminal groups.
DoppelPaymer
The extortion-through-data-exposure model that Maze popularized was quickly adopted by DoppelPaymer, which encrypts an organization’s data by gaining administrative access to its systems. In February 2020 the actors behind DoppelPaymer announced they’d launched a website where they will reveal legally compromising information about their victims, which includes Mexico’s state-owned oil company, Pemex.
Conti
First identified in 2020, Conti, a Russian-born RaaS outfit, quickly established itself as one of the more malicious forms of malware due to its rapid data encryption speed and double-extortion model. In late 2021 Conti made headlines for being the first cybercriminals to develop the Log4Shell attack chain targeting Apache’s Log4j2 vulnerabilities, creating numerous security concerns for all Java-based systems.
The one predictable thing about ransomware is that when one type is shut down, another one will take its place. Yet the fundamentals for protecting yourself still apply. While law enforcement plays virtual whack-a-mole, put yourself in the best position not to be the next crime victim: use strong passwords, implement multifactor authentication, back up and segment your data, and train your staff to guard against scams.
RELATED ARTICLES
Ransomware, Data Breaches and the Tension Between Disclosure and Damage Control
News of Note for the Internet-Minded (2/1/22) – AI Colleagues, AR Experiences and Ransomware Dangers