Report reveals signs of evening out in ransomware productivity

As ransomware actors continue to adapt, the new report underscores the importance of vigilance, collaboration, and innovative strategies in combating this evolving threat.

A comprehensive new WithSecure report provides crucial insights into the evolving world of ransomware. The report, which examines data and trends from the first half of 2024, reveals that the ransomware industry, after peaking in late 2023, is beginning to see a stabilization in productivity, with notable developments in ransomware targets, and industry dynamics.

While ransomware productivity has shown signs of leveling off in 2024, the frequency of attacks and ransom payments collected remained higher in the first half of 2024 compared to the same periods in 2022 and 2023.

“There has been a marked shift towards targeting small and medium-sized businesses, which now represent a larger proportion of ransomware victims,” says Tim West, Director of Threat Intelligence and Outreach at WithSecure.

Law enforcement actions, notably the takedown of the Lockbit ransomware group in February 2024, have played a critical role in disrupting major ransomware operations. These efforts have led to the seizure of significant assets and the dismantling of critical infrastructure used by ransomware groups. Despite these disruptions, the long-term impact of law enforcement on the ransomware ecosystem remains uncertain, with ransomware groups adapting and evolving in response.

The report examines the architecture of Ransomware-as-a-Service (RaaS) collectives, emphasizing the growing competition among ransomware franchises to attract affiliates. Notably, following the decline of prominent groups like Lockbit and ALPHV, many newly "nomadic" ransomware affiliates have aligned themselves with more established RaaS brands.

“Trust within the cybercriminal community has probably been significantly eroded due to incidents such as ALPHV's alleged exit scam, where affiliates were defrauded of their earnings, further complicating the dynamics within the ransomware ecosystem,” West describes.

A notable trend identified in the report is the increased adoption of initial access through edge service exploitation as described in previous WithSecure research this year, along with the frequent use of legitimate remote management tools by ransomware actors.

The report also touches on the persistent issue of reinfection, with data showing that a significant percentage of organizations that paid ransoms were later targeted again by the same or different ransomware groups.

Versa has announced the general commercial availability of Versa Sovereign SASE™, uniquely...
FortiAnalyzer leverages a unified data lake, FortiGuard Labs threat intelligence, and AI-driven...
This continued commitment to the European Commission’s Cybersecurity Skills Academy focuses on...
Other key findings include a resurgence of cryptomining malware, an increase in signature-based and...
HackerOne has published When ROI Falls Short: A Guide to Measuring Security Investments with Return...
The next version of Prisma Cloud adds AI-powered prioritization, automated remediation, and a new...
Threats continue to increase from Q3 level – with manufacturing being most targeted industry.
The latest agentic AI innovation from CrowdStrike triages detections with over 98% accuracy within...