According to the X-Force Threat Intelligence Index ransomware and vulnerability exploitations together were able to "imprison" businesses in 2021 further burdening global supply chains. Manufacturing emerged as the most targeted industry.
Attacking with all the tools of the trade
While phishing was the most common cause of cyberattacks in general in the past year, IBM Security X-Force observed a 33% increase in attacks caused by vulnerability exploitation of unpatched software, a point of entry that ransomware actors relied on more than any other to carry out their attacks in 2021, representing the cause of 44% of ransomware attacks.
Zeroing on the supply chain
The 2022 report details how in 2021 ransomware actors attempted to "fracture" the backbone of global supply chains with attacks on manufacturing, which became 2021's most attacked industry (23%), dethroning financial services and insurance after a long reign.
Experiencing more ransomware attacks than any other industry, attackers wagered on the ripple effect that disruption on manufacturing organisations would cause their downstream supply chains to pressure them into paying the ransom.
An alarming 47% of attacks on manufacturing were caused due to vulnerabilities that victim organisations had not yet or could not patch, highlighting the need for organisations to prioritize vulnerability management.
Trending
Ransomware gangs defy takedowns.
Ransomware persisted as the top attack method observed in 2021, with ransomware groups showing no sign of stopping, despite the uptick in ransomware takedowns. The average lifespan of a ransomware group before shutting down or rebranding is 17 months.
Vulnerabilities expose businesses' biggest "vice".
Unpatched vulnerabilities caused approximately 50% of attacks in 2021, exposing businesses' biggest struggle– patching vulnerabilities.
Warning signs of looming cyber crisis in the cloud.
Cybercriminals are laying the groundwork to target cloud environments, with the 2022 report revealing a 146% increase in new Linux ransomware code and a shift to Docker-focused targeting, potentially making it easier for more threat actors to leverage cloud environments for malicious purposes.
New goal: chasing leverage
According to Charles Henderson, head of IBM X-Force, cybercriminals usually chase the money. Now with ransomware, they are chasing leverage. He suggests that businesses recognise that vulnerabilities are holding them in a deadlock – as ransomware actors use that to their advantage.
“This is a non-binary challenge. The attack surface is only growing larger, so instead of operating under the assumption that every vulnerability in their environment has been patched, businesses should operate under an assumption of compromise, and enhance their vulnerability management with a zero-trust strategy,” he added.
The "Nine Lives" of ransomware groups
Responding to the recent acceleration of ransomware takedowns by law enforcement, ransomware groups may be activating their own disaster recovery plans. Analysis reveals that the average lifespan of a ransomware group before shutting down or rebranding is 17 months.
For example, REvil which was responsible for 37% of all ransomware attacks in 2021, persisted for four years through rebranding, suggesting the likelihood it resurfaces again despite its takedown by a multi-government operation in mid-2021.
While law enforcement takedowns can slow down ransomware attackers, they are also burdening them with the expenses required to fund their rebranding or rebuild their infrastructure.
As the playing field changes, it's important that organisations modernize their infrastructure to place their data in an environment that can help safeguard it – whether that be on-premises or in clouds.
This can help businesses manage, control, and protect their workloads, and remove threat actors' leverage in the event of a compromise by making it harder to access critical data in hybrid cloud environments.
Vulnerabilities are an existential crisis for some
The X-Force report says vulnerabilities in Industrial Control Systems rose by 50% year-over-year. Although more than 146,000 vulnerabilities have been disclosed in the past decade, it's only been in recent years that organisations accelerated their digital journey, largely driven by the pandemic, suggesting that the vulnerability management challenge has yet to reach its peak.
Vulnerability exploitation as an attack method is growing more popular. X-Force observed a 33% increase since the previous year, with the two most exploited vulnerabilities observed in 2021 found in widely used enterprise applications (Microsoft Exchange, Apache Log4J Library).
Enterprises' challenge to manage vulnerabilities may continue to exacerbate as digital infrastructures expand and businesses can grow overwhelmed with audit and upkeep requirements, highlighting the importance of operating on the assumption of compromise and applying a zero-trust strategy to help protect their architecture.
Cloud presents a new and growing target
In 2021, X-Force observed more attackers shifting their targeting to containers like Docker – by far the most dominant container runtime engine according to RedHat.
Attackers recognize that containers are common grounds amongst organisations so they are doubling down on ways to maximize their ROI with malware that can cross platforms and can be used as a jumping-off point to other components of their victims' infrastructure.
The 2022 report also sounds cautious on threat actors' continued investment into unique, previously unobserved, Linux malware, with data provided by Intezer revealing a 146% increase in Linux ransomware that has new code.
As attackers remain steady in their pursuit of ways to scale operations through cloud environments, businesses must focus on extending visibility into their hybrid infrastructure. Hybrid cloud environments that are built on interoperability and open standards can help organisations detect blind spots and accelerate and automate security responses.