{"id":36432,"date":"2022-05-24T10:45:00","date_gmt":"2022-05-24T10:45:00","guid":{"rendered":"https:\/\/cloudnewshub.com\/archives\/36432"},"modified":"2022-05-24T10:45:00","modified_gmt":"2022-05-24T10:45:00","slug":"ransomware-volumes-grew-faster-than-ever-in-2021","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=36432","title":{"rendered":"Ransomware volumes grew faster than ever in 2021"},"content":{"rendered":"<div><img decoding=\"async\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2022\/05\/ransomware-volumes-grew-faster-than-ever-in-2021.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cyber security experts would have had to have spent most of the past year hiding under a rock to have missed the increase in the volume of successful <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/ransomware\">ransomware attacks<\/a> during 2021, but according to figures released today in <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">Verizon\u2019s <em>2022 data breach investigations report<\/em><\/a> (DBIR), the year-on-year (YoY) jump seen last year was greater than the past five years combined.<\/p>\n<p>Verizon\u2019s Threat Research Advisory Centre (VTRAC), together with more than 80 independent industry contributors, observed a 13% increase in ransomware breaches last year. It said that as cyber criminals leverage increasingly sophisticated tools, ransomware was proving particularly successful at exploiting \u2013 and monetising \u2013 illegal access to data.<\/p>\n<p>This is the fifteenth&nbsp;year that Verizon has published its landmark DBIR report. For the latest edition, its data was drawn from a total of 23,895 security incidents of which 5,212 were confirmed breaches.<\/p>\n<p>Verizon\u2019s team said it was possible to attribute roughly 80% of these breaches to organised crime, with external actors about four times more likely to cause breaches in an organisation than malicious insiders. However, it also found there was a \u201chuman element\u201d involved in around 82% of them, largely due to three factors \u2013 social engineering, abuse of privilege, and simple human error.<\/p>\n<p>2021 was also noteworthy for the emergence of security incidents that began in the victim\u2019s supply chain \u2013 the <a href=\"https:\/\/www.computerweekly.com\/news\/252507279\/The-Security-Interviews-How-SolarWinds-came-through-its-darkest-hour\">SolarWinds<\/a> and <a href=\"https:\/\/www.techtarget.com\/searchitchannel\/news\/252503800\/Kaseya-ransomware-attack-underlines-vendor-accountability\">Kaseya<\/a> breaches being the most obvious examples of such attacks, with such organisations acting as \u201cforce multipliers\u201d for cyber criminals. Indeed, the VTRAC team found that 62% of system intrusions originated via an organisation\u2019s partner.<\/p>\n<p>\u201cOver the past few years, the pandemic has exposed a number of critical issues that businesses have been forced to navigate in real time. But nowhere is the need to adapt more compelling than in the <a href=\"https:\/\/www.computerweekly.com\/opinion\/Security-Think-Tank-Data-privacy-and-ethics-in-a-post-Covid-world\">world of cyber security<\/a>,\u201d said Hans Vestberg, CEO and chairman of Verizon.<\/p>\n<p>\u201cAs we continue to accelerate toward an increasingly digitised world, effective technological solutions, strong security frameworks, and an increased focus on education will all play their part in ensuring that businesses remain secure and customers protected.\u201d<\/p>\n<section class=\"section main-article-chapter\" data-menu-title=\"Fundamentals\">\n<h3 class=\"section-title\"><i class=\"icon\" data-icon=\"1\"><\/i>Fundamentals<\/h3>\n<p>Verizon said its latest report demonstrated there were four key paths leading to compromise \u2013 botnets, credentials, phishing, and vulnerability exploits \u2013 with all of them pervasive and no organisation properly secured without an appropriate plan to address them.<\/p>\n<p>As ever, it said, it behoves security teams to pay attention to some fundamental aspects of security controls \u2013 data protection, secure configuration of assets and software, account management, access control, and <a href=\"https:\/\/www.computerweekly.com\/feature\/How-do-I-get-my-users-to-pay-attention-to-security-training\">staff awareness and training<\/a>.<\/p>\n<p>DBIR lead author Dave Hylender added: \u201cEntering its 15th year, Verizon\u2019s <em>Data breach investigations report<\/em> remains the leading authority on assessing the many cyber security threats that organisations continue to face.<\/p>\n<p>\u201cAnd while the report has evolved, the fundamentals of security remain the same. Assess your exposure, mitigate your risk, and take appropriate action. As is often the case, getting the basics right is the single most important factor in determining success.\u201d<\/p>\n<p>Rick Holland, CISO and strategy vice-president at DBIR contributor <a href=\"https:\/\/www.digitalshadows.com\/\">Digital Shadows<\/a>, commented: \u201cIf I had to sum up this year\u2019s DBIR, the more things change, the more they stay the same. The use of stolen credentials, phishing, and vulnerabilities remains the top way threat actors gain initial access to organisations. Companies are spending billions of dollars on defence, yet these problems persist.\u201d<\/p>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security experts would have had to have spent most of the past year hiding under a rock to have missed the increase in the volume of successful ransomware attacks during 2021, but according to figures released today in Verizon\u2019s 2022 data breach investigations report (DBIR), the year-on-year (YoY) jump seen last year was greater [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":36433,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[533],"tags":[],"class_list":["post-36432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/36432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=36432"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/36432\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/36433"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=36432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=36432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=36432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}