Rise in Ransomware Attacks: Focus Shifts to Weak Credentials Over MFA

Article Highlights
Off On

In the ever-evolving battlefield of cybersecurity, ransomware groups have begun favoring tried-and-true methods to breach networks over exploiting software vulnerabilities. The focus has dramatically shifted toward exploiting weak credentials on VPN and gateway accounts that lack multifactor authentication (MFA), stepping away from the widespread zero-day vulnerability exploits that characterized the previous year. This change introduces new challenges for businesses striving to protect their digital environments from increasingly sophisticated threats.

Increasing Vulnerability: The Shift in Ransomware Tactics

Weak Credentials Over Common Vulnerabilities

The trend of prioritizing weak credentials was notably highlighted in the latter half of 2023 when an initial access broker (IAB) playbook was released. This playbook urged ransomware agents to focus on default and weak credentials, abandoning their earlier strategies of targeting zero-day vulnerabilities. Consequently, single vulnerabilities, which were extensively exploited in 2023, became less of a concern for ransomware groups by 2024. These methods show a preference for achieving network access with minimal effort, targeting straightforward vulnerabilities within systems rather than relying on more complex exploits.

This shift was further evidenced by a notable decrease in ransomware incidents involving widely-used platforms such as MOVEit and GoAnywhere. Rather than depending on time-consuming efforts to find and exploit software vulnerabilities, cybercriminals seemed to have acknowledged the easier and potentially more lucrative path – exploiting human error and insufficient security measures. The increase in attacks indicates the success rate of these basic but effective techniques. Weak credentials within VPNs and gateways devoid of MFA turned out to be fruitful sources for ransomware groups, leading to a notable rise in the number of attacks.

Consequences and Rising Ransomware Activity

According to Jason Rebholz of Travelers, the simplicity and effectiveness of these attacks underscore the vital need for robust security controls to safeguard against such threats. 2024 saw an alarming rise in ransomware activity, illustrated by the number of new victims regularly published on leak sites. In particular, Q4 2024 recorded a startling 1,663 new victims, representing a 32% increase from the previous quarter and surpassing every other quarter observed by Travelers. The month of November 2024 alone registered the highest number of ransomware victims with 629 cases.

Over the year, leak sites recorded a total of 5,243 ransomware victims, a 15% increase from the 4,548 cases in 2023. The surge in newly emerging ransomware groups further complicated the threat landscape, with a reported 67% increase in 2024 amounting to 55 new ransomware groups. The disruption of prominent ransomware-as-a-service operators by law enforcement led to the rise of new entities, continuing the relentless wave of attacks. Among the top aggressors was RansomHub, responsible for 238 incidents in Q4 2024, closely followed by Akira with 133 attacks and Play with 95 attacks.

The Call for Enhanced Security Measures

Importance of Adopting Comprehensive Security Strategies

The findings of Travelers’ report reveal a crucial narrative: ransomware actors are exploiting simpler and seemingly more effective methods to compromise systems. This trend serves as a stark reminder of the pressing need for businesses to employ thorough security measures. One fundamental defense mechanism stands out – adopting multifactor authentication (MFA). MFA is key in countering the threat posed by weak credentials and significantly reducing the likelihood of successful ransomware attacks.

Rebholz emphasized the necessity of applying state-of-the-art security controls. Organizations are urged to assess and enhance their cybersecurity protocols, focusing on the basics, such as enforcing strong password policies, regularly updating and patching software, and ensuring that VPNs and gateways are secured with MFA. The combination of these security practices can serve as a formidable barrier against the increasingly prevalent tactics of ransomware groups.

Future Considerations and Strategies

In the constantly shifting battlefield of cybersecurity, ransomware groups are now leaning towards more reliable methods for breaching networks, rather than exploiting software vulnerabilities. 2024 is expected to be challenging as new tactics emerge in the ransomware landscape. The focus has noticeably shifted towards exploiting weak credentials on VPN and gateway accounts that do not use multifactor authentication (MFA), moving away from the reliance on zero-day vulnerability exploits that were more common in previous years. This change brings new challenges for businesses striving to protect their digital environments against increasingly sophisticated threats. As businesses adapt, the emphasis on robust cybersecurity measures, including the use of MFA, becomes crucial. The evolution in attack methods underscores the necessity for companies to continuously enhance their security protocols to safeguard against these advanced threats, thereby fortifying their defenses in an ever-evolving digital world.

Explore more