Most common ‘sources’ of ransomware attacks in 2022 listed – Times of India

Ransomware attacks have seen an upward spiral and a report claimed that a majority of ransomware attacks in 2022 started with exploitation of public-facing applications. Data from compromised user accounts and malicious emails were the other two common sources of these cyberattacks.
According to Kaspersky Incident Response Analyst Report, “The nature of cyber incidents”, almost 43% of ransomware attacks investigated by Kaspersky experts in 2022 started with public facing applications’ exploitation.
Public facing applications are the ones that the public can access. These include web applications, mobile apps and VPN gateways.

An exploitation could be a software bug, a temporary glitch, or a misconfiguration. Hackers exploit these weaknesses to access a network. The report also found that the longest-running ransomware attacks began with the exploitation of public-facing applications.
Other sources of ransomware attacks
Data from previously compromised user accounts and malicious emails with 24% and 12%, respectively, are the next two major sources of ransomware attacks.
According to a separate IT Security Economics report, more than 40% of companies faced at least one ransomware attack in 2022 and SMBs spent an average of $6,500 for the data recovery. When it comes to large enterprises, the ransom amount averaged at $98,000.
“These figures reveal that ransomware attacks are still widespread and can hit any company at any time,” the report noted.

Hackers want user data
The report highlighted that the attackers’ goal was not extortion or data encryption, but the mining of personal data, intellectual property, and other sensitive information.
In most of these cases, known credentials had already been compromised.
“Continuing security issues with passwords, software vulnerabilities and social engineering become initial access vectors for attackers and provide them endless ways to perpetrate ransomware activities,” said Konstantin Sapronov, head of global emergency response team at Kaspersky.
In order to save business, companies are advised to set up and control a password policy, patch management, raise employee awareness and take regular anti-phishing measures.

function loadGtagEvents(isGoogleCampaignActive) { if (!isGoogleCampaignActive) { return; } var id = document.getElementById('toi-plus-google-campaign'); if (id) { return; } (function(f, b, e, v, n, t, s) { t = b.createElement(e); t.async = !0; t.defer = !0; t.src = v; t.id = 'toi-plus-google-campaign'; s = b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t, s); })(f, b, e, 'https://www.googletagmanager.com/gtag/js?id=AW-877820074', n, t, s); };

window.TimesApps = window.TimesApps || {}; var TimesApps = window.TimesApps; TimesApps.toiPlusEvents = function(config) { var isConfigAvailable = "toiplus_site_settings" in f && "isFBCampaignActive" in f.toiplus_site_settings && "isGoogleCampaignActive" in f.toiplus_site_settings; var isPrimeUser = window.isPrime; if (isConfigAvailable && !isPrimeUser) { loadGtagEvents(f.toiplus_site_settings.isGoogleCampaignActive); loadFBEvents(f.toiplus_site_settings.isFBCampaignActive); } else { var JarvisUrl="https://jarvis.indiatimes.com/v1/feeds/toi_plus/site_settings/643526e21443833f0c454615?db_env=published"; window.getFromClient(JarvisUrl, function(config){ if (config) { loadGtagEvents(config?.isGoogleCampaignActive); loadFBEvents(config?.isFBCampaignActive); } }) } }; })( window, document, 'script', );

For all the latest Technology News Click Here 

Read original article here

Denial of responsibility! TechAI is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.