The Redmond giant has become the safety champion. Microsoft has released the second edition of cybersignals, a report it produces periodically on cyber threats that shows trends in security and cybercrime. This document is fed with information from more than 43 billion security signals that it analyzes daily. In addition, it has more than 8,500 security experts worldwide.
The most active ransomware of all time with over 1400 accounts
The specialization and consolidation of cybercrime have pushed the Ransomware as a service (RaaS), becoming a dominant business model, indicating that more criminals, regardless of their technical knowledge, can deploy this type of malware. This issue of Cyber Signals offers insight into the evolution of cybercrime extortion.
RaaS lets cybercriminals buy access to both payloads from Ransomware such as data leakage and payment infrastructure. Cybercriminal groups Ransomware they are actually RaaS programs like Conti or REvil, used by many different players. East “industrialization” of cybercrime has created specialized functions, such as access broker who sell the possibility of accessing the networks. RaaS significantly lowers the barrier to entry for attackers, i.e. it makes their path easier. Since RaaS players sell their expertise to whoever wants to pay. Budding cybercriminals, without even having the technical prowess to use backdoors or design their own tools, can gain access to a victim. Simply by using out-of-the-box penetration testing and system administration applications.
The diplomas are multiplying
The endless list of stolen credentials available online indicates that without basic defenses such as multi-factor authentication (MFA), organizations are at a disadvantage when it comes to combating malicious code entry vectors . Ransomware before the deployment of malware. Once cybercriminals know that access to a company’s network is for sale, RaaS threat actors can create a chain of attacks, allowing themselves and others to benefit from these vulnerabilities.
Although many organizations find it too expensive to implement enhanced security protocols, this hardening actually saves money. Not only will systems be more secure, but they will spend less on security costs and spend less time responding to threats.
- Businesses are experiencing an increase in both the volume and sophistication of cyberattacks. The US Federal Bureau of Investigation’s 2021 Internet Crime Report found that the cost of cybercrime in the United States is over $900 million. . For its part, the European Union Agency for Cybersecurity (ENISA) reported that between May 2021 and June 2022, threat actors Ransomware approximately 10 terabytes of data were stolen per month, and that 58.2% of stolen files included personal employee data .
- More than 80% of attacks Ransomware they can be traced as common misconfigurations in software and devices.
- Microsoft’s Digital Crimes Unit Removed Over 1,000 URLs and 5,400 Kits Phishing between July 2021 and June 2022. Leading to the identification and closure of over 1,400 malicious email accounts used to harvest stolen customer credentials.
- The average time taken by an attacker to access the private data of a victim of an email from Phishing is one hour and 12 minutes.
- In the event of threats of endpointsif a device is compromised, the average time it takes an attacker to begin moving laterally within a corporate network is one hour and 42 minutes.