The Most Common Ways Hackers Infiltrate Systems

Share post:

Cybersecurity analysts at Coveware have studied ransomware attacks in the second quarter of 2021 and described in detail how phishing attacks and RDP attacks are the most popular entry points for ransomware attacks. These attacks are inexpensive to carry out and very effective.

Phishing attacks – in which cybercriminals send emails with a malicious attachment or send victims directly to a compromised website that delivers ransomware – phishing now accounts for 42 percent of attacks.

In addition, attacks on RDP services in which cybercriminals use weak or standard usernames and passwords – or sometimes gain access to legitimate login credentials via phishing emails – are still a widespread practice among ransomware groups and are responsible for 42 percent of attacks.

Software vulnerabilities – are by far the most popular vector for attacks on networks providing ransomware, which accounts for 14 percent of attacks, which are often used by some of the most sophisticated and notorious ransomware gangs.

According to Coveware, Sodinokibi – also known as REvil – is responsible for 16.5% of the ransomware attacks in the reporting period. In recent weeks, REvil infrastructure has mysteriously gone offline.

The second most productive ransomware during this period was Conti with 14.4% of ransomware. One of the most prolific attacks of the group was the attack on the Irish health system.

The third most productive ransomware during the three months between April and June was Avaddon, a form of ransomware that is distributed via phishing emails, which is responsible for 5.4% of attacks. In June, the group behind Avaddon said that they would close and published a decryption key for the ransomware.

New ransomware players Mespinoza and Hello Kitty make up the rest of the top five – and it is likely that as groups such as REvil and Avaddon allegedly close operations, new ransomware groups will try to replace them.

To help protect networks from intrusion, organizations are strongly encouraged to implement multifactor authentication across the network, which can prevent intruders from exploiting accounts.

For more information, read the original story in ZDNet.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Google Chrome update essential for Windows users

The latest Chrome update has just been rolled out, bringing the version up to 124.0.6367.78/.79. This update is...

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways