Page 141 - Cyber Defense eMagazine October 2023
P. 141

It’s important to know that the ransomware attackers who perform high amounts of breaches, such as
            Cerber, are using the blockchain to perform their attacks more efficiently. The teams must fight hard by
            coupling AI solutions to react to the attacks sooner.

               6.  Zero Day vulnerabilities

            There are various ways for creative rivals to breach the victim's network. The user credentials, which are
            generally stolen or bought from the online markets, are the main routes; however, the software is also
            vulnerable to this kind of exploit. Professional ransomware attackers are now evolving using zero-day
            susceptibilities for their malware practices. The LockBit ransomware group has raised a reward of 50,000
            dollars for flaws in their encryption system.



            Most common types of ransomware

               •  Lockers

            It is the type of ransomware that fully locks your system so your data is completely inaccessible. On the
            lock screen, the ransom demand is presented along with the timer to increase the urgency and force the
            victim to act accordingly.

               •  Crypto ransomware

            Crypto ransomware or encryptors are the most damaging variant of ransomware. It encrypts the files in
            a system, making the whole content inaccessible.

               •  Ransomware as a service

            It is done by a professional hacker anonymously. He handles all phases of the attack, from the circulation
            of ransomware to the assortment of cash.



            Real-life examples of ransomware

            Caesar Entertainment company and MGM Resorts both have been the victim of ransomware. However,
            the Caesars attack happened before the MGM resort attack, which locked their whole system, and the
            guests had to wait for hours to check in to the hotel.

            If we see the reports of the World Economic Forum, the cyberattacks were happening globally up to
            156% in the second quarter if we compare it to the first quarter of 2023. Last year, the revenue of both
            companies was above 10 billion dollars, and both were targeted by ALPHV or black cat and Scattered
            Spider. Both these gangs used social engineering to gain access to the IT systems of the firms. The
            ALPHV  states  that  they  infiltrated  the  MGM  resort  system  after  identifying  a  tech  employee  of  this
            company on LinkedIn and then giving a call to customer support. In contrast, the Scattered Spider tricked
            an employee of Caesars at a third-party dealer. The ransom attackers demanded 30 million dollars from
            Caesars.





            Cyber Defense eMagazine – October 2023 Edition                                                                                                                                                                                                          141
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   136   137   138   139   140   141   142   143   144   145   146