Close Menu
NotesleuNotesleu
    Facebook X (Twitter) Instagram
    Tuesday, February 10
    Facebook X (Twitter) Instagram
    NotesleuNotesleu
    • Home
    • General News
    • Cyber Attacks
    • Threats
    • Vulnerabilities
    • Cybersecurity
    • Contact Us
    • More
    NotesleuNotesleu
    Home»Cybersecurity»FBI Highlights Surge in Rapid Succession Ransomware Assaults
    Cybersecurity

    FBI Highlights Surge in Rapid Succession Ransomware Assaults

    By securnerd3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Follow Us
    Google News

    A recent alert from the FBI has shed light on an alarming rise in ransomware campaigns that deploy multiple malware variants on a victim’s network, leading to system encryption in less than two days.

    This latest Private Industry Notification issued by the FBI was instigated by patterns observed since July 2023.

    The authoritative agency highlighted the deployment of two unique ransomware strains by cybercriminals during their attack on various organizations. The notable variants used in these swift assaults include Diamond, Hive, LockBit, Karakurt, Royal, Quantum, and AvosLocker.

    According to the FBI, “Dual ransomware deployment has led to a mix of data breaches, extraction, and significant financial implications due to ransoms.”

    The bureau emphasized the potential severity of facing a second ransomware attack after an initial compromise.

    Previously, there was typically a span of at least 10 days between successive ransomware attacks on the same target. In stark contrast, the majority of such incidents now occur within 48 hours of one another, as the FBI’s statistics reveal.

    BleepingComputer’s conversation with Bill Siegel, CEO & Co-Founder of Coveware, revealed that double-encryption has persisted for some time. He stated, “Some cyber attackers deliberately deploy two separate strains for every attack. We often witness simultaneous attacks using MedusaLocker and Globemposter by a single criminal entity.”

    Moreover, Siegel commented on situations where two unique ransomware factions access a network after its initial breach, both executing attacks in close succession.

    A concerning observation shared by the FBI detailed how, from early 2022, several ransomware groups have started tweaking their data theft utilities, malware, and wipers to avoid detection.

    In certain scenarios, malevolent software with data-erasure capabilities was set to stay inactive on infiltrated systems. This software activates at set intervals, annihilating data across compromised networks.

    Attack timeline (Sophos X-Ops)

    Sophos X-Ops incident response teams reported a disturbing incident from last year. An automotive manufacturer faced breaches from three different factions: LockBit, Hive, and ALPHV/BlackCat, within a short span of two months.

    Sophos disclosed that some files were encrypted multiple times. They noted, “As the Hive attack began a mere 2 hours post the Lockbit assault, both attacks were in progress, leading to repeated encryption of certain files.”

    For countering such ransomware threats, the FBI emphasizes building strong ties with their regional FBI Field Offices. They also recommend routine system updates and comprehensive network scans for any latent vulnerabilities.

    Moreover, it’s crucial to safeguard remote access tools like RDP, VNC, etc., with access granted strictly through VPNs and fortified with robust passwords and mandatory multi-factor authentication.

    The bureau also advises segmenting networks, ensuring critical servers are contained within VLANs to amplify security. Consistent scans and network audits remain vital for pinpointing devices susceptible due to missing updates.

    Post Views: 60

    Related Posts

    • This AI Paper Deploys a Light-Weight Foundational Model in Outer Space for the First Time
    • Contact
    • Researchers Discover Universal Attack to Manipulate AI Chatbots
    • Massive DDoS attack on U.S. financial company thwarted by cyber firm
    Follow on Google News
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Add A Comment
    Leave A Reply Cancel Reply

    Recent Post

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024

    Top 7 Open-Source LLMs for 2024 and Their Uses

    July 18, 2024
    About Us
    About Us

    We're your premier source for the latest in AI, cybersecurity, science, and technology. Dedicated to providing clear, thorough, and accurate information, our team brings you insights into the innovations that shape tomorrow. Let's navigate the future together."

    Latest

    Complete HTML Handwritten Notes

    July 22, 2024

    Complete C++ Handwritten Notes From Basic to Advanced

    July 21, 2024

    Complete Python Ebook From Basic To Advanced

    July 20, 2024
    Popular Post

    Amazon sends Mastercard, Google Play gift card order emails by mistake

    October 2, 202310 Views

    Microsoft Enhances Windows 11 Security with Kerberos Authentication Over NTLM Protocol

    October 15, 202318 Views

    Cisco Uncovers Actively Exploited Zero-Day Vulnerabilities in IOS XE, Urges Immediate Action

    October 21, 202313 Views
    • Contact Us
    • About US
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 Notesleu. Designed by NIM.

    Type above and press Enter to search. Press Esc to cancel.