TechCrunch News 2024年10月31日
2024 looks set to be another record-breaking year for ransomware — and it’s likely going to get worse
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

尽管执法部门在打击勒索软件方面有所成果,但该行业仍蓬勃发展。2024年或成为勒索软件最赚钱的一年,赎金屡创新高。同时,年轻威胁者加入使情况恶化,数据盗窃攻击增加,还可能引发现实暴力。此外,美国大选结果也可能影响其未来。

🦹‍♂️勒索软件行业持续繁荣,2024年有望成为最赚钱的一年,赎金屡破纪录,如Change Healthcare支付2200万美元赎金。

👦年轻威胁者加入,如Lapsus$和Scattered Spider等,导致仅勒索攻击增多,数据盗窃攻击增加超30%。

💥勒索软件威胁可能升级为现实暴力,如Scattered Spider利用现实信息威胁目标,且攻击者可能直接从加密货币交易所偷钱。

🎙美国大选结果影响勒索软件未来,若美国不再与盟友共享情报,执法难度增加,可能加速勒索软件攻击。

The ransomware industry is thriving, not losing. 

Despite various law enforcement wins against ransomware actors, like the sweeping takedown of LockBit and the seizure of Radar, hackers continue to reap the rewards of these data-theft attacks — and 2024 looks set to be their most profitable year to date.

That’s according to Allan Liska, a ransomware expert who serves as a threat intelligence analyst at cybersecurity firm Recorded Future. In an interview with TechCrunch in London earlier this month, Liska confirmed that 2024 is on track to be another record-breaking year for ransomware — with equally record-breaking ransoms paid by victims to hackers. 

“The curve is going to flatten a little bit, which I guess is good news. But a record-breaking year is still a record-breaking year,” Liska told TechCrunch. “We’ve also this year, for the first time that I’m aware of, had four eight-figure ransoms paid.”

One of these eight-figure sums was the $22 million ransom that Change Healthcare paid to the Russian cybercrime gang ALPHV following the theft of highly sensitive medical data related to hundreds of millions of Americans. What followed, Liska said, was rampant in-fighting between the ransomware group and its affiliate, who carried out the hack on ALPHV’s behalf. 

“If you wanted a reality show, this was it,” said Liska. 

This apparent scrappiness is only likely to worsen as younger threat actors join the ransomware foray, as we’ve seen with highly skilled and financially motivated hackers like Lapsus$ and, more recently, Scattered Spider. This loose-knit group of predominantly teenage, native English-speaking hackers has carried out some of the most disastrous cyberattacks in history, such as the breach of MGM Hotels and the suspected links to the recent cyberattack on Transport for London.  

The disjointed nature of these attackers is evidenced by the increase of data theft-only attacks, which have increased by more than 30% in 2024, according to Liska. “That is up significantly from just a couple of years ago,” he told TechCrunch. “A lot of the newer threat actors just don’t want to deal with encryption, decryption, or anything like that,” referring to attacks that exfiltrate huge amounts of stolen data.

While the persistence of teenage hackers has already led to a rise in extortion-only attacks, that might be just the tip of the iceberg. Liska warns that these scrappy threat actors could choose to skip data theft entirely and decide to steal money directly from cryptocurrency exchanges instead. Worse, Liska warns that the fight against ransomware can spill into real-world violence, describing escalatory extortion tactics by groups like Scattered Spider, which use real-world information against their targets if their victims say they won’t pay a ransom. 

The outcome of the upcoming U.S. election could also have a major effect on the future of ransomware. 

Liska notes that the global ransomware taskforce set up under the Biden administration has been a “huge benefit” to the fight against hackers, thanks to an increase in the sharing of intelligence between nations. Liska said that there is “a good chance that goes away” if the U.S. no longer shares intelligence with its allies under a successive Trump administration, which has promised wide scale government deregulation. 

“I don’t think that’s something we’re prepared for — and we could see even more of an acceleration of ransomware attacks if law enforcement is less able to do their job,” said Liska. 

Under the previous Trump administration, “we saw WannaCry and NotPetya, and there was no immediate response,” said Liska

What’s the solution? According to Liska, who said at TechCrunch Disrupt 2023 that banning ransomware payments wasn’t the answer, doing so is now the only solution. 

“We’ve had 20-plus law enforcement actions just this year against ransomware, and that is fantastic. But if we’re going to feed eight-figure ransom payments to these attackers then that changes the incentive model.You might get arrested, but on the other hand, you might get an eight-figure ransom payment, that’s a challenge that is hard to resist.”

“My answer is: ban ransom payments, which is a terrible solution, but it may be the least bad solution that we have,” Liska added.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

勒索软件 数据盗窃 现实暴力 美国大选 情报共享
相关文章