A Techs LandA Techs Land
  • Home
  • News
  • Entertainment
  • Fashion
  • Health
  • Sports
  • Tech
  • Tips
  • Travel
Facebook Twitter Instagram
  • Privacy Policy
  • Contact Us
  • Sitemap
Facebook Twitter Instagram Pinterest Vimeo
A Techs LandA Techs Land
  • Home
  • News
  • Entertainment
  • Fashion
  • Health
  • Sports
  • Tech
  • Tips
  • Travel
Contact
A Techs LandA Techs Land
Home»News»Ransomware Attacks on Linux Grow by 75%
News

Ransomware Attacks on Linux Grow by 75%

By JohnSeptember 19, 2023Updated:September 19, 20233 Mins Read
Share Facebook Twitter Pinterest LinkedIn Email Reddit Telegram WhatsApp
Screenshot 1 2
Share
Facebook Twitter LinkedIn Pinterest Telegram WhatsApp Email

A trend that, as revealed by Proven data, has led them to block a total of 63 billion threats in the first half of 2022 as a result of the adoption of systems.

During the first quarter of 2022, a large part of the workers returned to traditional offices or opted for a transition to a hybrid work model that combined in-person and remote work. A fact that contributed to countless organizations having to redouble their efforts and adapt to the new context to face an increasing attack surface.

In this new normal, security teams have had to face a real challenge: defending all IT infrastructures. However, ransomware developers have not remained passive either and have opted for more lucrative and efficient monetization models. Specifically, Proven data explains, the ransomware linux as a service (RaaS) model stands out.

Thus, according to the report developed by the cybersecurity company, Defending the Expanding Attack Surface. Proven data 2022 Midyear Cybersecurity Report, during the first half of the year three RaaS threat actors stood out above the rest: Conti, LockBit and BlackCat.

Deciphering the Keys

Detection of ransomware attacks as a service skyrocketed in the first half of 2022. Major players such as LockBit and Conti were detected with a 500% increase year-on-year and almost doubled the number of detections in six months respectively. Likewise, the ransomware-as-a-service model has generated significant benefits for cybercriminals and their affiliates, so it is not surprising that new ransomware groups continually emerge. The most notable in the first half of 2022 was Black Basta; The organization attacked 50 companies in just two months.

According to the document, many cyber attackers persist in hunting large companies, although SMEs are an increasingly popular target. Along these same lines, it is worth noting that one of the main attack vectors of ransomware is the exploitation of vulnerabilities.

A trend supported by figures: Proven data’s Zero Day Initiative published warnings about 944 vulnerabilities in this period, which translates into an increase of 23% year-on-year. The number of critical error notices published shot up 400% year-on-year in this regard.

The report reveals that APT groups continue to update their methods through expansive infrastructure and combining various malware tools. The fact that the number of detections has increased tenfold is further evidence that threat actors are increasingly integrating Emotet as part of their elaborate cybercrime operations. The concern is that threat actors are able to weaponize these flaws faster than vendors can release patch updates and/or customers can patch them.

As a result, unpatched vulnerabilities add to a growing digital attack surface that many organizations are struggling to manage securely as the hybrid workplace expands their IT environment. More than two-fifths (43%) of global organizations believe it is “out of control.”

loud visibility is especially important given the continued threat of third parties exploiting poorly configured environments and using novel techniques such as cloud-based cryptocurrency mining and cloud tunneling. The latter is frequently used by threat actors to direct malware traffic or host phishing websites. To address this new environment, Jon Clay, vice president of threat intelligence at Proven data, infers, “a single, unified cybersecurity platform is the best place to start.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleApple AirTag Price Per Month: A Comprehensive Guide
Next Article How Does Apple AirTag Work Without Wi-Fi
John
  • Website

I am John. Passionate about exploring the latest trends and developments in the world of technology. With years of experience writing about topics ranging from software to hardware, I strive to share my insights and knowledge with readers around the world. I am always on the lookout for new product, and trends to write about, and passionate about helping people learn about all the amazing things that technology has to offer.

Related Posts

News

Strategic Asset Protection: Safeguarding Wealth Across Borders

May 28, 2024
News

Why Should You Hire a Collection Attorney in New York? 

May 8, 2024
News

Angular and TypeScript: Evolving Together

May 7, 2024
Add A Comment

Leave A Reply Cancel Reply

Trending

Does Amazon Have Dark Mode? A Comprehensive Guide to Amazon’s Dark Mode Features

June 1, 2025

What is Amazon Digital? A Comprehensive Guide to Amazon’s Digital Services

May 31, 2025

How to Cancel Amazon Music: A Step-by-Step Guide

May 31, 2025

How to Play YouTube with Screen Off: The Ultimate Guide for Android and iOS

May 31, 2025
Most Popular

How to Find People You Follow on Amazon: A Complete Guide

June 3, 2025

The Most Expensive Item on Amazon: A Guide to the Luxury Products Available

June 3, 2025

How to Find Who You Follow on Amazon: A Complete Guide

June 3, 2025
Our Picks

How to Remove “Continue Watching” from Amazon Prime: A Comprehensive Guide

June 3, 2025

What Are Amazon Digital Downloads? Everything You Need to Know

June 1, 2025

How to See Who You Follow on Amazon: A Complete Guide

June 1, 2025

Subscribe to Updates

Get the latest creative news from atechsland about News, Business, Fashion and More.

Facebook Twitter Instagram Pinterest
  • Privacy Policy
  • Contact Us
  • Sitemap
Atechsland.com © 2025 All Right Reserved

Type above and press Enter to search. Press Esc to cancel.