The number of ransomware groups engaging in multipoint ransomware activities, also known as double-tap or double-extortion methods, to pressure targets into acceding to their ransom demands has been surging over the past three quarters of the year, reports SiliconAngle.
Cybersecurity company WithSecure Oyj revealed in its new report that 29 of the 60 multipoint extortion ransomware groups it has been tracking in the first nine months of 2023 are new players. These new groups appear to follow playbooks set by older ransomware gangs. "Many of the new groups weve seen this year have clear lineage in older ransomware operations," noted Ziggy Davies, a threat intelligence analyst at WithSecure. "For example, Akira and several other groups share many similarities with the now-defunct Conti group and are likely former Conti affiliates." In addition, the number of data leaks from ransomware groups during this period was up 50% compared to last year. Twenty-five percent of those leaks were made by ransomware gangs that emerged this year, and only six groups have posted a new victim each month so far in 2023.
Nearly $115 million worth of cryptocurrency have been stolen so far from the HTX digital currency exchange, formerly Huobi, and the Heco Chain blockchain bridge following a cyberattack last week, CNBC reports.
Tennessee-based hospital system Vanderbilt University Medical Center has confirmed being impacted by a cyber incident that compromised one of its databases after being listed on the data leak site of the Meow ransomware gang on Thanksgiving, according to The Record, a news site by cybersecurity firm Recorded Future.
Cyber Resilience in the Ransomware and Wiper Era New Strategies for CISOs to Protect
The changing face of ransomware, and how to respond
Unveiling the Hidden Threat: Hybrid Attackers Leveraging Identities to Execute Ransomware
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news