Report reveals signs of evening out in ransomware productivity

As ransomware actors continue to adapt, the new report underscores the importance of vigilance, collaboration, and innovative strategies in combating this evolving threat.

  • Wednesday, 28th August 2024 Posted 8 months ago in by Phil Alsop

A comprehensive new WithSecure report provides crucial insights into the evolving world of ransomware. The report, which examines data and trends from the first half of 2024, reveals that the ransomware industry, after peaking in late 2023, is beginning to see a stabilization in productivity, with notable developments in ransomware targets, and industry dynamics.

While ransomware productivity has shown signs of leveling off in 2024, the frequency of attacks and ransom payments collected remained higher in the first half of 2024 compared to the same periods in 2022 and 2023.

“There has been a marked shift towards targeting small and medium-sized businesses, which now represent a larger proportion of ransomware victims,” says Tim West, Director of Threat Intelligence and Outreach at WithSecure.

Law enforcement actions, notably the takedown of the Lockbit ransomware group in February 2024, have played a critical role in disrupting major ransomware operations. These efforts have led to the seizure of significant assets and the dismantling of critical infrastructure used by ransomware groups. Despite these disruptions, the long-term impact of law enforcement on the ransomware ecosystem remains uncertain, with ransomware groups adapting and evolving in response.

The report examines the architecture of Ransomware-as-a-Service (RaaS) collectives, emphasizing the growing competition among ransomware franchises to attract affiliates. Notably, following the decline of prominent groups like Lockbit and ALPHV, many newly "nomadic" ransomware affiliates have aligned themselves with more established RaaS brands.

“Trust within the cybercriminal community has probably been significantly eroded due to incidents such as ALPHV's alleged exit scam, where affiliates were defrauded of their earnings, further complicating the dynamics within the ransomware ecosystem,” West describes.

A notable trend identified in the report is the increased adoption of initial access through edge service exploitation as described in previous WithSecure research this year, along with the frequent use of legitimate remote management tools by ransomware actors.

The report also touches on the persistent issue of reinfection, with data showing that a significant percentage of organizations that paid ransoms were later targeted again by the same or different ransomware groups.

High-profile cyberattacks highlight a recurring issue: employees are often the weakest security link.
New research from Ventrica shows that UK companies can’t afford to replace humans with AI in customer service enquiries, with an emotive experience...
Kubernetes has firmly transitioned from an emerging technology into a core part of enterprise production environments, according to a new survey from...
Findings from ‘Unlocking Growth in the Mid-Market: The Node4 Report’ point to a lack of alignment around AI investment, public cloud consumption,...

AI causes cyber resilience rethink

Posted 20 hours ago by Phil Alsop
Unveiled at the RSAC™ Conference, the 2025 LevelBlue Futures Report finds only 29% of executives are prepared for AI-powered threats, despite...

Mixed uptake of Proactive Cybersecurity

Posted 20 hours ago by Phil Alsop
Mixed uptake of Proactive Cybersecurity

4 in 10 UK CIOs warn of unrealistic board expectations

Posted 21 hours ago by Phil Alsop
A new survey commissioned by Expereo exposes the true roadblocks to UK AI plans - poor infrastructure, resistance from employees, unreasonable...
Kubernetes complexity drives surge in demand for enhanced observability tools