Blog

Rising ransomware attacks point to a larger cybersecurity problem

By |

In January 2022, we witnessed a huge rise in ransomware attacks specifically on IoT and IT networks. Most of these attacks were designed to lock up the data, copy parts or whole of it and then dump the data on the Dark Web. If media reports are to be believed, many organizations that ended up paying a ransom didn’t get their data back.

If we break up the ransomware problem, we can identify these as the key attributes of the bigger challenge posed by ransomware to businesses:

  • Insider threat: emerging from employees or partners willingly or unwittingly ending up aiding hackers. Learn more about dead drops
  • Rising potency of ransomware: hackers have invested extensively in ramping up the facilities behind ransomware production and distribution and this is the reason behind 2021 turning into a very successful year for hackers
  • Growing ransom demand: there are contrasting reports on what was the highest ransom demand placed last year but it can be easily inferred that the ransom rates have certainly grown significantly in 2021
  • The rising role of enablers: while the number of ransom developers is growing, so is the role of the enablers. These include negotiators and even professional breach enablers who help in placing the ransomware in the target networks
  • Bleeding data: in December 2021, the volume of new data dumped on the Dark Web rose by nearly 3 TB. 
  • Hackers are now more aware of the vulnerabilities, cybersecurity gaps, and process deficiencies associated with IoT, IT, and OT in businesses and they are using this information to breach assets and networks   

What can businesses do to protect themselves from ransomware attacks?

  • In sectors like manufacturing, pharma, defense, and retail, cybersecurity needs to be embedded into supply chains and feeder processes
  • For small and medium businesses, operational visibility and visibility into networks at all times is a must.
  • Oil and gas (upstream and downstream operators) is a sector that has been traditionally vulnerable to a range of threats. Oil and gas companies need to harden their operations from a cybersecurity perspective and revisit their processes and cybersecurity practices to align them with the new cyber threats and challenges that are emerging in the background
  • Healthcare firms need to ramp up their IT security and invest extensively in securing their data
  • Micro-segmentation: involving fragmenting networks to enable greater visibility and granular enforcement of cybersecurity policies is a must deploy cybersecurity measure   
  • Industrial Control Systems and health and safety systems should be especially protected as these could not just create an operational challenge for businesses but more importantly, could create a health and safety hazard for employees working in manufacturing plants that deal with oil and gas products and other complex and dangerous chemicals
  • Cybersecurity audits should be conducted at least once a month. There are many available formats for conducting this. We have created one for you here that is aligned with the NIST framework
  • Encourage employees to report incidents and incentivize them to proactively detect and report vulnerabilities or security gaps
  • Businesses connected with a long tail and short tail supply chains should collaborate to arrive at common security standards and measures that they can deploy together
  • Enforce a no-click policy for suspicious emails
  • Look at opting for multiple vendors for obtaining your threat intelligence feeds

Looking at improving your IoT, OT, and IT cybersecurity, consult an expert from Sectrio for free. Book your slot now.

Try out our threat intelligence feeds and improve your threat hunting capabilities.

See how our OT-IoT-IT security solution can handle such threats to your enterprise. Book a no-obligation demo. 

Improve your cybersecurity through ot and iot focused threat intelligence feeds free for 15 days
Rising ransomware attacks point to a larger cybersecurity problem - Sectrio

Get access to enriched IoT-focused cyber threat intelligence for free for 15 days  

Ot and iot security standards and best practices for ciso's
Rising ransomware attacks point to a larger cybersecurity problem - Sectrio

Download our CISO IoT and OT security handbook  

Gain insights from the largest ot and iot focused honeypot network - sectrio
Rising ransomware attacks point to a larger cybersecurity problem - Sectrio

Access our latest Global Threat Landscape report  

Share:
Avatar of prayukth k v
Prayukth K V has been actively involved in productizing and promoting cross eco-system collaboration in the emerging tech and cybersecurity domains for over a decade. A marketer by profession and a published author, he has also proposed and promoted critical infrastructure protection strategies that rely on in-depth threat research and deflection strategies to deceive hackers and malware. Having been at the frontlines of cyber securing infrastructure, Prayukth has seen cyberattacks and defense tactics at close quarters.

Subscribe to Newsletter

Related Posts

Protect your IoT, OT and converged assets with Sectrio