Site icon IT World Canada

Ransomware attacks will be more targeted in 2022: Trend Micro

image of a crystal ball to illustrate predictions for the future

Ransomware attacks will become more targeted in 2022, according to researchers at Trend Micro, focusing on servers and cloud providers.

The cybersecurity company’s annual predictions report says ransomware operators will use increasingly complex extortion methods, such as exfiltrating data in order to weaponize it. “Their attacks will pose a challenge for security teams, as many enterprises have yet to invest in securing their servers as much as they have invested in securing their endpoints,” says the report.

The infiltration techniques used by ransomware operators will likely stay the same, the report adds, but they will be used to go after more complex targets, ones that will possibly be bigger than the major targets of previous years.

Researchers also believe ransomware operators will also use more modern and sophisticated methods of extortion that will resemble nation-state advanced persistent threat (APT) attacks. “Once attackers are able to infiltrate their victims’ environments, they can opt to just exfiltrate sensitive data and go straight to extorting their victims, skipping the encryption or access blocking step altogether, the report says. “In terms of the primary means of successful extortion, the focus will veer away from denial of access to critical data in favor of leaking and mining stolen data for weaponization.”

Generally, research, foresight, and automation are critical for organizations to manage risk and secure their workforce from any cyber threat, the report says.

“Malicious actors are poised to move in on the opportunities arising from a business landscape still in flux” with new hybrid work models, the report says. “New pain points are bound to arise as the push for digital transformations continues to redefine organizations’ attack surfaces. However, companies will be prepared to curb these threats by hardening their defenses with a multitude of tools and best practices.”

Other predictions include:

The report urges CISOs and CIOs to go back to security basics and prioritize network visibility. Strategies include:

Exit mobile version