Ransomware’s evolution: 6 key trends to watch
As security teams start to fight back, attackers have only become more sophisticated.
In his recent article for TechBeacon, John P. Mello takes a look at six key trends of Ransomware evolution including the fact that cloud deployments are increasingly a target. He uses our recent Ransomware research to support his case -- specifically our findings which found that:
- Every environment surveyed had identities with a risk factor as well as the ability to perform ransomware on at least 90% of the buckets in an AWS account.
- More than 70% of the environments had machines publicly exposed to the
- Internet and identities whose permissions allowed the exposed machines to perform ransomware.
- Over 45% of the environments had third-party identities with the ability to perform ransomware by elevating their privileges to an administrative level.
- Almost 80% of the environments had IAM users with enabled access keys that had not been used for 180 days or more and that had the ability to perform ransomware.
Other trends Mello includes in his list include the fact that remote workforces are contributing to the rise in attacks; attacks are now more focused, sophisticated, and stealthy; and Ransomware attackers are resorting to double extortion.
For his full list of trends to watch, check out the full article on TechBeacon.