Ransomware attacks are getting more complex and even harder to prevent

Enterprise

Products You May Like

Ransomware attackers are probing known common vulnerabilities and exposures (CVEs) for weaknesses and quickly capitalizing on them, launching attacks faster than vendor teams can patch them. Unfortunately, ransomware attackers are also making attacks more complex, costly, and challenging to identify and stop, by acting on potential targets’ weaknesses faster than enterprises can react.

Ransomware’s knowledge gap is growing

Two recent research studies, Ivanti’s latest ransomware report conducted with Cyber Security Works and Cyware, and a second study by Forrester Consulting on behalf of Cyware, show there’s a widening gap between how quickly enterprises can identify a ransomware threat versus the quickness of a cyberattack. Both studies provide a stark assessment of how far behind enterprises are on identifying and stopping ransomware attacks.

Ransomware attackers are expanding their attack arsenal at an increasing rate, adopting new technologies quickly. The Ransomware Index Update Q3 2021 identified ransomware groups expanding their attack arsenal with 12 new vulnerability associations in Q3, twice the previous quarter. Newer, more sophisticated techniques, including Trojan-as-a-service and Dropper-as-a-service (DaaS), are being adopted in attacks. Additionally, over the last year, more ransomware code has been leaked online as more advanced cybercriminals look to recruit less-advanced gangs as part of their ransomware networks.

Ransomware continues to be among the fastest-growing cyberattack strategies of 2021. The number of known vulnerabilities associated with ransomware has increased from 266 to 278 in Q3 of 2021 alone. There’s also been a 4.5% increase in trending vulnerabilities actively exploited to launch attacks, taking the total count to 140. Furthermore, Ivanti’s Index Update discovered five new ransomware families in Q3, contributing to the total number of ransomware families globally reaching 151.

Ransomware groups are mining known CVEs to find and capitalize on zero-day vulnerabilities before the CVEs are added to the National Vulnerability Database (NVD) and patches are released. 258 CVEs created before 2021 are now affiliated with ransomware based on recent attack patterns. The high number of legacy CVEs further illustrates how aggressive ransomware attackers are at capitalizing on past CVE weaknesses. That’s 92.4% of all vulnerabilities tracked being tied to ransomware today.

Threat intelligence is hard to find

Seventy-one percent of security leaders say their teams need access to threat intelligence, security operations data, incident response, and vulnerability data, according to Forrester’s Opportunity Snapshot study commissioned by Cyware. However, 65% are finding it a challenge today to provide security teams with cohesive data access. Sixty-four percent can’t share cyber threat intelligence data cross-functionally today, limiting the amount of Security Operations Center (SOC), incident response, and threat intelligence shared across departments. The following graphic illustrates how far behind enterprises are in providing real-time threat intelligence data. The knowledge gap between enterprises and ransomware attackers is growing, accelerated by how quickly attackers capitalize on known CVE weaknesses.

Above: Just 23% of enterprises provide their security teams with vulnerability data to identify potential ransomware attacks and breach attempts. Ransomware attackers have the upper hand in knowing which systems and configurations defined in CVEs are the most vulnerable. They are creating more sophisticated, complex ransomware code to capitalize on long-standing system gaps.

Image Credit: Cyware and Forrester

Enterprises’ lack of access to real-time threat intelligence data leads ransomware attackers to fast-track more complex, challenging attacks while demanding higher ransoms. The US Treasury’s Financial Crimes Enforcement Network or FinCEN released a report in June 2021 that found suspicious activity reported in ransomware-related Suspicious Activity Reports (SARs) during the first six months of 2021 reached $590 million, exceeding the $416 million reported for all of 2020. FinCEN also found that $5.2 billion in Bitcoin has been paid to the ten leading ransomware gangs over the last three years. The average ransom is now $45 million, with Bitcoin being the preferred payment currency.

Attacking the weak spots in CVEs

The Q3 2021 Ransomware Index Spotlight Report illustrates how ransomware attackers study long-standing CVEs to find legacy system gaps in security to exploit, often undetected by under-protected enterprises. An example is how HelloKitty ransomware uses CVE-2019-7481, a CVE with a Common Vulnerability Scoring System (CVSS) score of 7.5. In addition, the Index notes the Cring ransomware family has added two vulnerabilities (CVE-2009-3960 and CVE-2010-2861) that have been in existence for over a decade. Patches are available, yet enterprises remain vulnerable to ransomware attacks because they haven’t patched legacy applications and operating systems yet. For example, a successful ransomware attack took place on a ColdFusion server recently running an outdated version of Microsoft Windows. The following compares the timelines of two CVEs, illustrating how Cring ransomware attacked each over a decade since each was initially reported:

The Q3 2021 Ransomware Index Spotlight Report includes an assessment of CVE-2009-3960 because it has recently been linked to Cring ransomware, further illustrating the point of how ransomware attackers are in essence mining CVEs for long-standing weaknesses to capitalize on.

Above: The Q3 2021 Ransomware Index Spotlight Report includes an assessment of CVE-2009-3960 because it has recently been linked to Cring ransomware, further illustrating the point of how ransomware attackers are in essence mining CVEs for long-standing weaknesses to capitalize on.

Image Credit: Ivanti

As of Q3, 2021, there are 278 CVEs or vulnerabilities associated with ransomware, quantifying the threat’s rapid growth. Additionally, 12 vulnerabilities are now associated with seven ransomware strains. One of the new vulnerabilities identified this quarter follows Q2’s zero-day exploit defined in CVE-2021-30116, a zero-day vulnerability in Kaseya Unitrends Service exploited in the massive supply chain attack on July 03, 2021, by the REvil group.

On July 07, 2021, Kaseya acknowledged the attack and was added to the NVD on July 09, 2021. A patch for the same was released on July 11, 2021. Unfortunately, the vulnerability was exploited by REvil ransomware even as the security team at Kaseya was preparing to release a patch for their systems (after reporting the vulnerability back in April 2021). The following table provides insights into the 12 newly associated vulnerabilities by CVE ranked by CVSS Score. Enterprises who know they have vulnerabilities related to these CVEs need to accelerate their efforts in vulnerability data, threat intelligence, incident response, and security operations data.

Ivanti’s Q3 2021 Ransomware Index Spotlight Report provides a hot list of CVEs for enterprises to evaluate their risk exposure and get on top of any potential weaknesses they have in these respective areas.

Above: Ivanti’s Q3 2021 Ransomware Index Spotlight Report provides a hot list of CVEs for enterprises to evaluate their risk exposure and get on top of any potential weaknesses they have in these respective areas.

Image Credit: Ivanti

Conclusion

The balance of power is shifting to ransomware attackers due to their quicker adoption of new technologies into their arsenals and launch attacks. As a result, enterprises need a greater sense of urgency to standardize on threat intelligence, patch management, and most of all, zero trust security if they’re doing to stand a chance of shutting down ransomware attacks. The Kaseya attack by REvil validates the continuing trend of ransomware groups exploiting zero-day vulnerabilities even before the National Vulnerability Database (NVD) publishes them. The attack also highlights the need for an agile-patching cadence that addresses vulnerabilities as soon as they are identified, rather than waiting for an inventory-driven and often slow rollout of patch management across inventories of devices.

VentureBeat

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact.

Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:

  • up-to-date information on the subjects of interest to you
  • our newsletters
  • gated thought-leader content and discounted access to our prized events, such as Transform 2021: Learn More
  • networking features, and more

Become a member

Products You May Like

Leave a Reply

Your email address will not be published. Required fields are marked *