The state of ransomware
- how to future-proof your cyber security
Introduction
With the explosion of Artificial Intelligence into every aspect of our lives, as well as the professionalization of cyber crime and the fast-paced evolution of technology, the world of ransomware is changing.
But what does that mean and how will it impact small- and medium-sized companies both right now and in the future?
Tom Van de Wiele, Cyber Security Authority, Speaker, Ethical Hacker and Security Advisor, Hacker Minded
"Whenever you can deny someone something they need, you have power over them."
Ransomware Trends and Predictions
Shift towards data extortion
Ransomware trends suggest a shift toward data extortion as organizations enhance their defences against traditional encryption-based attacks. Attackers are pivoting from encrypting data to focusing on data theft and extortion as primary revenue streams.
"Whenever you can deny someone something they need, you have power over them." Tom Van de Wiele
Rise of Cybercrime-as-a-Service (CaaS)
The emergence of CaaS is another significant trend in ransomware. CaaS provides a marketplace where aspiring ransomware operators can buy ransomware kits, malware, and access credentials, lowering the barrier to entry for cybercriminals. This ecosystem fosters the proliferation of ransomware attacks across various industries, making it easier for less experienced attackers to participate in the cybercrime landscape.
Operational resilience as a countermeasure
To mitigate the impact of ransomware, organizations must prioritize operational resilience. This involves comprehensive threat modelling, exposure management, and maintaining a solid recovery plan. Protecting high-risk areas, particularly legacy systems with limited recovery options, is crucial. Organizations should invest in robust backup solutions and regularly test recovery procedures to ensure swift restoration of critical functions following an attack.
- Slide 1
- Slide 2
- Slide 3
How to future-proof your cyber security
Despite constant progress and evolution in the cyber security landscape, ransomware remains one of the most daunting threats facing organizations. At its core, ransomware persists because it is profitable. Cybercriminals will continue to launch ransomware attacks as long as they can expect to make significant financial returns. Advances in areas like cloud infrastructure, SaaS, and mobile technology are convenient, but they also expose new vulnerabilities ransomware attackers are exploiting.
Security Challenges
Many people believed that the shift to working in the cloud would mean automatic data security, but that is not the reality. Cloud platforms provide standardized environments, immutable backups, and enhanced tracking of API actions, which support incident response. However, they also introduce significant security challenges. Because cloud systems are accessible from anywhere, they are attractive targets for ransomware attackers, who can exploit open access points. If an attacker obtains credentials, they can potentially infiltrate networks as easily as an authorized user. Once inside, attackers leverage deep integrations within the cloud, such as compromised API keys, to escalate privileges and move laterally. This easy access and privilege escalation complicates real-time visibility and response for security teams. A key challenge in cloud security is reliance on third-party vendors, such as Microsoft or Google, for critical infrastructure. Unlike on-premises setups, cloud environments don’t always provide detailed logs or controls, making forensic investigations more difficult. Even with improved logging, retrieving and analysing data often requires specialized third-party tools.
Email remains one of the most reliable channels for ransomware and other cyberattacks, primarily through phishing and malware distribution. Attackers exploit email to deliver highly targeted phishing campaigns, often tailoring messages based on specific job roles. For example, finance team members frequently receive emails labelled “Invoice,” a tactic attackers use to trick recipients into opening malicious attachments or links, capitalizing on routine activities.
Once attackers compromise an email account, they often gain access to additional cloud services, especially in environments where single sign-on (SSO) is enabled. This integration allows them to pivot from email to other platforms such as SharePoint, OneDrive, or Google Drive. Using trusted services like Microsoft 365 or DocuSign, attackers distribute malicious secure links that evade conventional security scans. This tactic leverages the credibility of these platforms, making detection by email filters and anti-malware tools more challenging, as attackers blend into regular operations.
SSO structures create another vulnerability, as a single compromised email account can act as a gateway to other corporate applications, including file storage, collaborative platforms, and shared calendars. Attackers use compromised accounts to search for stored passwords or sensitive data, allowing them to deepen their access without new entry points.
With the rise of “Malware-as-a-Service” (MaaS) and similar frameworks, even low-skilled attackers can launch sophisticated campaigns, while more advanced attackers utilize “living off the land” strategies. This approach involves using legitimate tools within a system to avoid detection, enabling attackers to blend into the environment without triggering security alarms.
Email dependence
Email remains vital for business, despite security risks. Even with protections like spam filters and protocols, email’s universal use means users are likely to continue interacting with phishing attempts, keeping this method effective. Although organizations are seeking secure alternatives, email’s accessibility and widespread adoption make it hard to replace. Alternative communication platforms like Slack offer potential security advantages, but they are not immune to phishing. For instance, compromised Slack tokens have been used to access corporate networks. User awareness training remains essential, but breaking ingrained habits, like clicking links, is difficult. Strategies such as network segmentation and monitoring help mitigate risks if phishing attempts are successful, ensuring systems are resilient beyond user actions alone.
Email remains a primary phishing tool, but attackers are increasingly diversifying. New tactics include "quishing" (QR code phishing) and "smishing" (phishing via SMS), which exploit user trust in seemingly familiar sources. Attackers use these methods to bypass traditional email security filters and deceive users through alternate channels, broadening their reach and effectiveness.
Phishers often exploit well-known third-party services, sending messages from reputable-looking domains or platforms users recognize. This low-cost, high-impact approach takes advantage of trusted brands to bypass security and deceive users, particularly as email remains a standard communication method across organizations.
QR codes
QR codes, ubiquitous in places like restaurants and hotels, are prime targets for phishing. Attackers replace legitimate QR codes with malicious ones, leading users to fake login pages or harmful sites. Given mobile devices' generally lower security levels, QR code phishing is especially effective, as users often assume QR codes are safe in certain contexts.
Multi-stage phishing attacks
Some attackers use layered phishing tactics, like sending an email with a QR code that directs users to a malicious site. Mobile devices, often lacking advanced security features, are particularly vulnerable to these attacks. This multi-layered approach combines several tactics to bypass defences and increase the chances of a successful breach.
Phishing predictions
Phishing attacks are expected to grow more sophisticated with AI, which will enable attackers to automate and personalize efforts. Techniques like “quishing” are likely to increase, especially on mobile devices where visibility is limited. Attackers will continue exploiting users’ trust in familiar communication formats, pushing phishing into new territory.
"AI is a catalyst, a tool multiplier... It enables attackers who already know what they're doing to profile targets faster." Tom Van de Wiele
Artificial Intelligence (AI) is amplifying the capabilities of both attackers and defenders. As both a tool and a catalyst, AI is a force multiplier, accelerating the speed and sophistication of cyber operations on both sides of the spectrum.
How AI benefits attackers
AI provides significant advantages for attackers, particularly in streamlining reconnaissance and attack execution. Attackers can leverage AI to analyse vast datasets and identify potential targets with unprecedented speed, often using open-source AI models to locate code vulnerabilities or misconfigurations that they can exploit. By utilizing AI-driven tools, attackers can quickly scan for system weaknesses and find ways to access sensitive data or critical systems. Moreover, AI-powered tools enable attackers to perform “mass profiling,” understanding not just individual targets but also the broader digital ecosystem around them, such as supply chains and interconnected networks. With this information, attackers can repurpose successful attack strategies across multiple similar environments.
"AI is going to lower the entry costs for a lot of attackers." Rob Anderson
AI also lowers the barrier of entry for less sophisticated attackers. For instance, “cybercrime-as-a-service” models, where people can purchase malicious software or scripts, are becoming more accessible due to AI. Additionally, advancements in AI-driven natural language processing mean phishing attacks are becoming harder to detect. AI can now craft highly convincing fake emails or messages that are almost indistinguishable from legitimate communications, making it easier to deceive even well-trained users. In the long term, this shift may overwhelm defenders by escalating both the volume and complexity of attacks.
How AI benefits defenders
On the defensive side, AI is a powerful ally for cybersecurity professionals, enabling rapid detection, analysis, and response to threats. Defenders are increasingly using AI to monitor network traffic for unusual patterns that may indicate a cyber attack. By analysing logs and detecting anomalies in real-time, AI can help identify intrusions that might otherwise go unnoticed until significant damage is done.
Defenders can also use AI to improve incident response times by automating initial assessments and writing custom code. For instance, generative AI tools like ChatGPT can assist in writing custom scripts that rapidly examine data logs or parse new malware samples, making defences more agile and adaptable.
Moreover, AI enables defenders to create realistic test environments and simulate production-like data for testing purposes, thereby improving security testing and detection capabilities. This strategy, often supplemented by “canary tokens” that can alert defenders if breached, offers a way to monitor systems without exposing real production data to risks. However, cybersecurity professionals must remain vigilant, as AI-generated defences are not foolproof; they may contain plausible yet incorrect data that could mislead or provide a false sense of security.
Rob Anderson, Principal Incident Response Investigator, WithSecure
"The cloud is great for incident response... but it also opens up a different set of problems."
Practical tips for combatting the ransomware threat
1. Shift from reactive to proactive security controls
Investing in high-profile security products is only part of the solution; organizations must also leverage these tools proactively. This includes dedicating time for threat modelling, identifying potential adversaries, and using data to uncover vulnerabilities. Turning on logging features—often disabled to reduce noise—can yield valuable insights when monitored effectively, for example. A proactive security posture should be informed by intelligence-led risk analysis, rather than relying on assumptions about safety.
2. Embrace data-driven security perspectives
Some organizations equate a lack of incidents with strong security, but analysing unsuccessful attack attempts will reveal the reality, and provide crucial information about the types of threats targeting your organization. For instance, if attackers start using internal names or proprietary information in phishing attempts, it may indicate a more sophisticated, targeted campaign that requires immediate attention.
3. Look beyond your organization
It's easy to concentrate on internal security, but organizations must also consider the broader software ecosystem. For example, many companies rely on open-source software maintained by a limited number of developers, which can be a vulnerability. Attackers may target these developers to gain access to larger organizations that utilize their code.
"There’s no size too small for attackers – I’ve seen everything from small charities to large corporations fall victim to ransomware." Rob Anderson
4. Prioritize continuous threat intelligence
Active engagement in threat intelligence is essential for effective exposure management and early detection of emerging threats. By monitoring potential attack vectors and staying informed about the tactics employed by threat actors, organizations can adapt their defences accordingly. Regular threat modelling exercises are vital, enabling organizations to not only react to incidents, but also anticipate future attacks and bolster their defences against evolving ransomware tactics.
Related content
Incident readiness & response
Master your cybersecurity with our ultimate Incident Readiness and Response services. Guarantee business continuity and risk reduction against any threat.
Read moreWithSecure™ Elements XDR
Dive into elite cyber protection with our Extended Detection and Response. Experience groundbreaking security that proactively defends against even the stealthiest threats. Secure your assets now!
Read moreWithSecure™ Elements Exposure Management
Transform your cybersecurity strategy with our Elements Exposure Management. Predict and prevent breaches with advanced, AI-driven visibility and control. Start defending smarter today!
Read more