Rise in Ransomware Attacks: Focus Shifts to Weak Credentials Over MFA

Article Highlights
Off On

In the ever-evolving battlefield of cybersecurity, ransomware groups have begun favoring tried-and-true methods to breach networks over exploiting software vulnerabilities. The focus has dramatically shifted toward exploiting weak credentials on VPN and gateway accounts that lack multifactor authentication (MFA), stepping away from the widespread zero-day vulnerability exploits that characterized the previous year. This change introduces new challenges for businesses striving to protect their digital environments from increasingly sophisticated threats.

Increasing Vulnerability: The Shift in Ransomware Tactics

Weak Credentials Over Common Vulnerabilities

The trend of prioritizing weak credentials was notably highlighted in the latter half of 2023 when an initial access broker (IAB) playbook was released. This playbook urged ransomware agents to focus on default and weak credentials, abandoning their earlier strategies of targeting zero-day vulnerabilities. Consequently, single vulnerabilities, which were extensively exploited in 2023, became less of a concern for ransomware groups by 2024. These methods show a preference for achieving network access with minimal effort, targeting straightforward vulnerabilities within systems rather than relying on more complex exploits.

This shift was further evidenced by a notable decrease in ransomware incidents involving widely-used platforms such as MOVEit and GoAnywhere. Rather than depending on time-consuming efforts to find and exploit software vulnerabilities, cybercriminals seemed to have acknowledged the easier and potentially more lucrative path – exploiting human error and insufficient security measures. The increase in attacks indicates the success rate of these basic but effective techniques. Weak credentials within VPNs and gateways devoid of MFA turned out to be fruitful sources for ransomware groups, leading to a notable rise in the number of attacks.

Consequences and Rising Ransomware Activity

According to Jason Rebholz of Travelers, the simplicity and effectiveness of these attacks underscore the vital need for robust security controls to safeguard against such threats. 2024 saw an alarming rise in ransomware activity, illustrated by the number of new victims regularly published on leak sites. In particular, Q4 2024 recorded a startling 1,663 new victims, representing a 32% increase from the previous quarter and surpassing every other quarter observed by Travelers. The month of November 2024 alone registered the highest number of ransomware victims with 629 cases.

Over the year, leak sites recorded a total of 5,243 ransomware victims, a 15% increase from the 4,548 cases in 2023. The surge in newly emerging ransomware groups further complicated the threat landscape, with a reported 67% increase in 2024 amounting to 55 new ransomware groups. The disruption of prominent ransomware-as-a-service operators by law enforcement led to the rise of new entities, continuing the relentless wave of attacks. Among the top aggressors was RansomHub, responsible for 238 incidents in Q4 2024, closely followed by Akira with 133 attacks and Play with 95 attacks.

The Call for Enhanced Security Measures

Importance of Adopting Comprehensive Security Strategies

The findings of Travelers’ report reveal a crucial narrative: ransomware actors are exploiting simpler and seemingly more effective methods to compromise systems. This trend serves as a stark reminder of the pressing need for businesses to employ thorough security measures. One fundamental defense mechanism stands out – adopting multifactor authentication (MFA). MFA is key in countering the threat posed by weak credentials and significantly reducing the likelihood of successful ransomware attacks.

Rebholz emphasized the necessity of applying state-of-the-art security controls. Organizations are urged to assess and enhance their cybersecurity protocols, focusing on the basics, such as enforcing strong password policies, regularly updating and patching software, and ensuring that VPNs and gateways are secured with MFA. The combination of these security practices can serve as a formidable barrier against the increasingly prevalent tactics of ransomware groups.

Future Considerations and Strategies

In the constantly shifting battlefield of cybersecurity, ransomware groups are now leaning towards more reliable methods for breaching networks, rather than exploiting software vulnerabilities. 2024 is expected to be challenging as new tactics emerge in the ransomware landscape. The focus has noticeably shifted towards exploiting weak credentials on VPN and gateway accounts that do not use multifactor authentication (MFA), moving away from the reliance on zero-day vulnerability exploits that were more common in previous years. This change brings new challenges for businesses striving to protect their digital environments against increasingly sophisticated threats. As businesses adapt, the emphasis on robust cybersecurity measures, including the use of MFA, becomes crucial. The evolution in attack methods underscores the necessity for companies to continuously enhance their security protocols to safeguard against these advanced threats, thereby fortifying their defenses in an ever-evolving digital world.

Explore more

AI and Generative AI Transform Global Corporate Banking

The high-stakes world of global corporate finance has finally severed its ties to the sluggish, paper-heavy traditions of the past, replacing the clatter of manual data entry with the silent, lightning-fast processing of neural networks. While the industry once viewed artificial intelligence as a speculative luxury confined to the periphery of experimental “innovation labs,” it has now matured into the

Is Auditability the New Standard for Agentic AI in Finance?

The days when a financial analyst could be mesmerized by a chatbot simply generating a coherent market summary have vanished, replaced by a rigorous demand for structural transparency. As financial institutions pivot from experimental generative models to autonomous agents capable of managing liquidity and executing trades, the “wow factor” has been eclipsed by the cold reality of production-grade requirements. In

How to Bridge the Execution Gap in Customer Experience

The modern enterprise often functions like a sophisticated supercomputer that possesses every piece of relevant information about a customer yet remains fundamentally incapable of addressing a simple inquiry without requiring the individual to repeat their identity multiple times across different departments. This jarring reality highlights a systemic failure known as the execution gap—a void where multi-million dollar investments in marketing

Trend Analysis: AI Driven DevSecOps Orchestration

The velocity of software production has reached a point where human intervention is no longer the primary driver of development, but rather the most significant bottleneck in the security lifecycle. As generative tools produce massive volumes of functional code in seconds, the traditional manual review process has effectively crumbled under the weight of machine-generated output. This shift has created a

Navigating Kubernetes Complexity With FinOps and DevOps Culture

The rapid transition from static virtual machine environments to the fluid, containerized architecture of Kubernetes has effectively rewritten the rules of modern infrastructure management. While this shift has empowered engineering teams to deploy at an unprecedented velocity, it has simultaneously introduced a layer of financial complexity that traditional billing models are ill-equipped to handle. As organizations navigate the current landscape,