#report #cybercrime #HTCT #ransomware
Let's take a look at the “Corporansom: threat number one” highlights⬇️
🔹According to data leak sites, in 2021, the most active #ransomware groups were #Conti, #Lockbit and #Avaddon.
🔹Almost half of the companies whose data was released on DLS in 2021 originate from the US🇺🇸, followed by Canada🇨🇦 and France🇫🇷.
🔹According to the DLS data, the main industries targeted in 2021 were #manufacturing, real estate, and #transportation. In 2020, the situation was almost the same, which suggests that attackers mainly target the same types of companies that they believe to be the most profitable.
🔹In H2 2020 – H1 2021, #RaaS gangs increased the conversion by posting compromised data online on their Data Leak Sites (#DLS). It has become very popular, with the number of victims whose data has been published on DLSs having grown by 935%.
🔹SoftPerfect Network Scanner, Cobalt Strike Beacon, and ADFind were the top 3 most popular tools encountered by Group-IB experts in their response to #ransomware attacks.
Download the report now for more insights -> https://bit.ly/31NMsRX
Let's take a look at the “Corporansom: threat number one” highlights⬇️
🔹According to data leak sites, in 2021, the most active #ransomware groups were #Conti, #Lockbit and #Avaddon.
🔹Almost half of the companies whose data was released on DLS in 2021 originate from the US🇺🇸, followed by Canada🇨🇦 and France🇫🇷.
🔹According to the DLS data, the main industries targeted in 2021 were #manufacturing, real estate, and #transportation. In 2020, the situation was almost the same, which suggests that attackers mainly target the same types of companies that they believe to be the most profitable.
🔹In H2 2020 – H1 2021, #RaaS gangs increased the conversion by posting compromised data online on their Data Leak Sites (#DLS). It has become very popular, with the number of victims whose data has been published on DLSs having grown by 935%.
🔹SoftPerfect Network Scanner, Cobalt Strike Beacon, and ADFind were the top 3 most popular tools encountered by Group-IB experts in their response to #ransomware attacks.
Download the report now for more insights -> https://bit.ly/31NMsRX
Group-IB
Hi-Tech Crime Trends 2021/2022. Uninvited Guests: The Sale of Access to Corporate Networks | Group-IB
Analysis of dark web forums to understand the sale of access to compromised infrastructure.
#CactusCon #LockBit #Ransomware
Group-IB at CactusCon 🌵
Want to learn more about the latest operations of LockBit ransomware? Join Track 3 of the CactusCon, the largest annual hacker and security conference in Arizona, on Feb. 5. Group-IB’s head of DFIR team, Oleg Skulkin, will talk about LockBit’s TTPs and custom tools.
Save your spot now: https://www.eventbrite.com/e/cactuscon-10-tickets-161667538961
Group-IB at CactusCon 🌵
Want to learn more about the latest operations of LockBit ransomware? Join Track 3 of the CactusCon, the largest annual hacker and security conference in Arizona, on Feb. 5. Group-IB’s head of DFIR team, Oleg Skulkin, will talk about LockBit’s TTPs and custom tools.
Save your spot now: https://www.eventbrite.com/e/cactuscon-10-tickets-161667538961
Group-IB has been contracted by Fawry, a leading Egyptian e-payment company, following an alleged attack by the LockBit ransomware group. We are collaborating closely with Fawry to investigate and enhance system security. Further details in our press release.
#cybersecurity #LockBit #ransomware #DFIR
#cybersecurity #LockBit #ransomware #DFIR
🔥14❤4👍4