Page 198 - Cyber Defense eMagazine August 2024
P. 198

Cybersecurity Threats in Focus: Ransomware, Botnets, and Data Theft

            Ransomware  Attacks:  Ransomware  is a cybersecurity  threat that involves several vectors  for use as
            an  entry  way  into  a  network,  such  as  email  phishing,  infected  sites,  and  software  or  operating
            vulnerabilities. Soon after, a ransomware infection enters a network and encrypts documents on infected
            devices,  thereby precluding  access.  Attackers go on to require  ransom payment,  mostly done  through
            cryptocurrencies,  to be able to give out keys for decryption that then allows access to data.

            The effects of ransomware are devastating.  They can paralyze operations to a much extent by making
            access to critical files almost impossible—with  huge downtimes and operational paralysis. For example,
            in 2023, ransomware groups were very successful, making this the worst year on record. The number of
            victims had risen 55.5 percent to 5,070 from the 2022 figure. There were 2,903 victims in the second and
            third quarters combined, more than the total victims in 2022.

            One very striking example is the Royal Mail, targeted by the LockBit ransomware group. It took out Royal
            Mail's  ability  to  send  international  parcels,  effectively  halting  a  key  portion  of  its  operations.    LockBit
            threatened to leak the stolen data unless a ransom was paid. What is more, ransomware attacks pose a
            very serious risk of sensitive information exposure in cases of attackers making a threat to leak data in
            order to coerce payment. The plain truth of the matter is that both operational disruption, and the potential
            exposure of data due to a cybersecurity incident, presents an organization with a dual jeopardy of risk.

            Botnet  Exploitation:  Botnets  pose  a  continuing  threat  and  are  used  by  cybercriminals  to  further
            disseminate malware, conduct DDoS attacks, and steal sensitive data from victim networks.

            Historically,  botnets  were  majorly  referred  to as viruses  that  infected  computers  and then  propagated
            through  networks,  spreading  havoc.  However,  botnets  are  now  being  manipulated  by  some  sort  of
            sophisticated  bot masters or hacker groups who are propagating  malware  through various channels to
            exploit  the  vulnerabilities  in  the  potentially  compromised  system.  Once  a  system  is  infected,  botnets
            continue  to  work  subtly  to  remain  undetected  and  communicate  with  their  botmaster  to  follow  the
            respective commands. Then, the attackers will monetize the successful breaches through video attacks,
            deployment  of  ransomware  that  encrypts  data,  or  using  a  compromised  system  for  cryptocurrency
            mining.

            Usually, botnets take an average of approximately eight months before they are found. This is where one
            of the long-lived  botnets  goes,  right at the  top—to show  the need  for intrusion  detection  systems  and
            proactive security measures.  Without these defenses in place, the subtle indicators of botnet activities,
            such as sudden spikes in network traffic or performance degradation, can easily be overlooked and pose
            serious organizational security risks.

            At our  organization,  we  had a  large-scale  incident  with  our client,  where  botnet  activity  was detected
            against  institutions.  Such  attacks  were  targeting  institutions  by  the  exploitation  of  network  protocol
            vulnerabilities  while  scanning large ranges  of IP addresses.  The intrusion  prevention  systems in place
            were instrumental to the detection and mitigation of this malicious activity.

            Data Theft: Cybercriminals  leverage DNS exploits to exfiltrate data from the system, which essentially
            means the transmission of sensitive information out of the organizational  perimeter. Such incidents can






            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          198
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   193   194   195   196   197   198   199   200   201   202   203