Sign in to unlock valuable content and features from our AI-driven platform. Receive timely technology updates and the latest information from the solution providers who can help you realize your goals.
Start your journey by entering your name and email address below:
Please confirm your email address!
We are going to send a confirmation email to your email address to let you receive timely technology updates and the latest information from the solution providers who can help you realize your goals.
Is this you? Please confirm your name and email address below to receive the requested information.
Please check this box to confirm that you are opting-in to receive communications from Rack Systems Limited and the data sharing outlined in our privacy policy.
Initializing
Loading
The 2024 Ransomware Threat Landscape
Ransomware attackers are changing their tactics, focusing more on vulnerabilities in public-facing software to deliver their payloads. That's one of the findings in this report from Symantec, which looks at the latest trends and techniques used by ransomware actors. It covers prevalent tactics, techniques, and procedures (TTPs) employed by threat actors, including the use of command and scripting interpreters, tool transfer, obfuscation, credential dumping, and exploitation of remote services. The report also includes case studies that demonstrate real-world examples of successful ransomware attacks. When it comes to cyber threats, what you don't know CAN hurt you. Download your complimentary copy of the report.
.
Please enter your information below to view this content:
Ransomware remains a significant threat for organizations of all sizes, with attacks surging in September and October 2023, nearly doubling compared to October 2022. The ransomware business model has evolved, with operators using tactics like double-extortion and ransomware-as-a-service (RaaS) to maximize their impact. New players like Noberus and LockBit have emerged as dominant forces in the landscape.
What tactics do ransomware attackers commonly use?
Ransomware attacks typically involve multiple stages and a variety of TTPs. Common techniques include lateral movement using tools like PsExec and PowerShell, credential dumping with tools like Mimikatz, and exploiting known vulnerabilities in public-facing applications. Understanding these TTPs helps organizations prioritize their defensive measures.
How can organizations protect themselves from ransomware?
Organizations can enhance their defenses by reducing the number of accounts with administrator privileges, increasing protection on those accounts, and regularly updating software to patch known vulnerabilities. Additionally, monitoring for suspicious activity and employing advanced threat detection tools can help identify and block potential ransomware attacks before they escalate.
The 2024 Ransomware Threat Landscape
published by Rack Systems Ltd
Rack Systems Ltd empowers businesses in East Africa through expert IT consultancy and knowledge transfer. We specialize in guiding digital transformation and equipping teams with the tools to innovate and grow in today’s dynamic landscape. Let’s unlock new possibilities together.