Gone..but for how long
The group behind recent high-profile ransomware attacks disappeared this week, with its web sites and infrastructure suddenly going offline. The disappearance came four days after President Biden demanded his Russian counterpart take action against ransomware groups attacking US organisations. Tempting as it might be to connect the two events, it's just as likely the group, known as REvil, decided to lie low until the dust from their recent exploits settles. Other ransomware groups have gone offline in the past, only to re-emerge with updated tools and methods.
Researchers have been analysing REvil's methods and their conclusions are depressing, but not unexpected. Palo Alto Networks says the most common tactics are as simple as a phishing message and/or logging into Remote Desktop Protocol servers using stolen credentials. Given how effective this approach has been, it's easy to see why REvil wouldn't bother with anything more complicated. And Palo Alto says REvil has been very effective indeed; the average payout so far this year is $2.25 million.
Many organisations lack both the technology and the knowledge to prevent or detect ransomware attacks, according to research by Trend Micro. Its survey found a widespread inability to detect phishing emails, remote desktop protocol (RDP) compromise or other common techniques. Trend Micro urges organisations to adopt multi-factor authentication, install security updates promptly and ensure employees have regular awareness sessions. And Palo Alto Networks says it's essential to learn what's normal in an IT environment so that any changes can be spotted and analysed.