CIO Influence
CIO Influence News IT and DevOps Security

Study Seventy-four Percent of IT Decision Makers Say New Extortion Tactics Make Ransomware a National Security Threat

Study Seventy-four Percent of IT Decision Makers Say New Extortion Tactics Make Ransomware a National Security Threat
Extortion continues even when ransom is paid, putting CISOs under pressure

Venafi, the inventor and leading provider of machine identity management, announced the findings of a global survey of IT decision makers on the use of double and triple extortion in ransomware attacks. The data reveals 74% of IT decision makers are so concerned about new extortion tactics that they believe ransomware should be considered a matter of national security. This data takes on a new urgency in light of the recent advisory from the U.K.’s National Cyber Security Centre (NCSC), Australian Cyber Security Centre (ACSC), Federal Bureau of Investigation (FBI), National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) that has detailed the growing risks posed by ransomware. Extortion tactics mean that ransomware defense strategies focused on data protection are no longer effective. Organizations need a more robust ransomware security program to protect against these risks.

Double and triple extortion tactics are creating new security challenges for victims of ransomware, regardless of company size. Even after a ransom has been paid, cybercriminals are following through on multiple threats:

Top iTechnology Cloud News: Mark43 Launches Mark43 Crisis Response Directory to Increase Access to Crisis Response Information Amid Calls to Reimagine Public Safety

  • Almost a fifth (18%) of victims paid the ransom but still had their data exposed on the dark web
  • Almost 1-in-10 companies (8%) refused to pay the ransom, and the attackers tried to extort their customers
  • More than a third (35%) of victims paid the ransom but were still unable to retrieve their data

“Ransomware attacks have become much more dangerous. They have evolved beyond basic security defenses and business continuity techniques like next-gen antivirus and backups,” said Kevin Bocek, vice president of business development and threat intelligence at Venafi. “Organizations are unprepared to defend against ransomware that exfiltrates data, so they pay the ransom, but this only motivates attackers to target new victims. The bad news is that attackers are following through on extortion threats, even after the ransom has been paid! This means CISOs are under increased pressure because a successful attack is much more likely to create a full-scale service disruption that affects customers.”

When asked about the evolution of extortion in ransomware attacks, 71% of those polled say that double and triple extortion tactics have grown in popularity over the last 12 months, and 65% agree that these new threats make it much harder to say no to ransom demands.

Top iTechnology Automation News: Barracuda Expands Global Data Protection Reach With Three New Regional Data Centers

In addition:

  • 38% of attacks threaten to use stolen data to extort customers
  • 35% of attacks threaten to expose stolen data on the dark web
  • 32% threaten to inform the victim’s customers that their data has been stolen

These tactics are creating new security challenges for organizations of every size. Almost three quarters (72%) of IT decision makers agree that ransomware attacks are evolving faster than the security controls needed to defend against them. These threats are so grave that two thirds (67%) of IT decision makers agree that public reporting of ransomware attacks could help to slow the growth of these new attack methods. A further 77% agree that governments should do more to help private companies defend themselves from ransomware.

“Threat actors are constantly evolving their attacks to make them more potent, and it’s time for the cybersecurity industry to respond in kind,” explained Bocek. “Ransomware often evades detection simply because it runs without a trusted machine identity. Using machine identity management to reduce the use of unsigned scripts, increase code signing and restrict the execution of malicious macros is vital to well-rounded ransomware protection.”

Top iTechnology 5G Technology News: New 4G/LTE Capabilities Will Improve The Efficiency And Safety Of Vehicle Fleets In Puerto Rico After The Permanent Disconnection Of 3G Networks

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

New App Stability Report Shows Release Cadence of Top Mobile Apps Is Speeding Up by 40%

CyberLink Announces the Release of FaceMe Platform, a Complete API Solution for Facial Recognition

Dizzion and Frame Platform Both Positioned in the 2023 Gartner Magic Quadrant for Desktop as a Service

PR Newswire

Leave a Comment