A new ransomware strain found, and questions about the level of ransomware payments.
Welcome to Cyber Security Today. It’s Wednesday, January 31st, 2024. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.
A new ransomware strain has been circulating for almost a year. According to a researcher at Netenrich, the group calls itself Alpha. Its data leak site lists six victims. Three firms are in the U.S., two in the U.K. and one is in Israel. The group is relatively new and still in the process of setting up operations. Victims are sent a personal decryption key to log into a messaging portal where they can negotiate a ransom. The gang says victim firms can upload three encrypted files that will be unscrambled as proof the decryptor they buy actually works.
There’s evidence that fewer organizations hit by ransomware are paying up. Coveware, which acts for firms in ransomware negotiations, says the average ransomware payment dropped over 2023. In fact it went down 33 per cent in the fourth quarter compared to what was paid in the third quarter. This may be due to better IT defences and backups, allowing some victims to ignore payment demands — although by the count of other companies 2023 was a record year for successful ransomware attacks. It also may be that more organizations just don’t trust crooks to keep their promises that stolen data will be deleted. We’ll see if the trend continues.
Another report issued this week has conflicting data. The survey of security and IT pros done by Cohesity suggests that despite pleas by governments not to pay ransomware gangs, organizations haven’t discarded the option. More than 90 per cent of respondents believe their company would pay a ransom to recover data and restore business processes. Nine in 10 respondents said their organization paid a ransom in the last two years. Over two-thirds of respondents believe their organization would be willing to pay over US$3 million to recover data.
Almost half of cybersecurity leaders in financial institutions believe their firm has been successfully hacked without being detected. That’s according to a report from Contrast Security. It surveyed infosec leaders in financial institutions to find out the state of cybersecurity in the sector. Among the findings: Lots of attacks by threat actors trying to steal corporate information, lots of attacks involving the destruction of data and lots of attacks on application programming interfaces. The report suggests financial institutions have to up their defensive game.
Artificial intelligence is coming to Android device users. Google’s Bard AI platform will be used to analyze your Google Messages and become a personal assistant. But will this be a privacy problem — particularly because messages will be sent to Google’s cloud for processing. An article on Forbes.com raises interesting questions. There’s a link to it here.
Security teams have to invest more in automation and internal training to combat knowledge gaps, and on improving the visibility of their IT environment. That’s the conclusion of security vendor Exabeam, which commissioned a global survey of IT pros in eight countries. Over 90 per cent of respondents believed they had a good or excellent ability to detect cyber threats. However almost 60 per cent of respondents said they experienced security incidents in the previous 12 months so significant they required extra resources to remediate. Also, respondents think they are only seeing about 66 per cent of their IT environments.
Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.