The Two Gangs Responsible For Half Of The Ransomware Attacks In Q1 2022

Share post:

Analysis of recorded ransomware attacks between January and March 2022 highlighted LockBit 2.0 and Conti as the two most active ransomware gangs.

While the two gangs accounted for 58% of all incidents, LockBit was more prolific with 38% of ransomware attacks. Conti ransomware group accounted for 20% of ransomware attacks in the same period.

The analysis was recorded by cybersecurity researchers at Digital Shadows. According to the researchers, LockBit leaked the information of more than 200 victims in the first quarter of 2022, the highest number of leaks to date in 2022.

Both PYSA ransomware which is the third most active ransomware group, and REvil seem to have disappeared or stopped working.

New ransomware gangs are however coming up to replace those no longer working. Some of the new ransomware groups include Stormus, Night Sky, Zeon, Pandora, Sugar, and x001xs.

To protect themselves from ransomware attacks, organizations are advised to apply security patches to software and operating systems as quickly as possible.

In addition, organizations must enable multi-factor authentication for all users. This will help provide an additional layer of security.

The sources for this piece include an article in ZDNet.


Related articles

Cyber Security Today, May 20, 2024 -Ransomware gang claims it hit a Canadian internet provider

A ransomware gang claims it hit a Canadian internet provider. Welcome to Cyber Security Today. It's Monday May 20th,...

Cyber Security Today, Week in Review for week ending Friday May 17, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, May 17th,...

Cyber Security Today, May 17, 2024 – Malware hiding in Apache Tomcat servers

Malware hiding in Apache Tomcat servers, new backdoors found, and more Welcome to Cyber Security Today. It's Friday, May...

MIT students exploit blockchain vulnerability to steal 25 million dollars

Two MIT students have been implicated in a highly sophisticated cryptocurrency heist, where they reportedly exploited a vulnerability...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways