Endpoint

8/23/2016
04:05 PM
Connect Directly
Twitter
Twitter
RSS
E-Mail
50%
50%

Ransomware Costs Enterprises $209M In 1H 2016

New report from Trend Micro shows the addition of ransomware families in first half of the year nearly doubled numbers for new families found in all of 2015.

With the first half of the year left in the dust, cyberattack tally counts are starting to trickle in and, to the surprise of no one, ransomware statistics are dominating the limelight. On the docket today is a new 2016 mid-year report from researchers with Trend Micro who say that more new ransomware families emerged in the first half of 2016 than in all of 2015.

The report shows that the occurrence of ransomware families has almost doubled over last year's numbers. The additional 79 new families added this year combined with all of the old variants has cost enterprises $209 million in monetary losses this year so far, the report says. 

"Ransomware is capable of crippling organizations who face it, and the cybercriminals spearheading these attacks are creatively evolving on a continuous basis to keep enterprises guessing,” said Raimund Genes, chief technology officer for Trend Micro. “It has dominated the threat landscape so far in 2016, causing immense losses to businesses across multiple industries."

In spite of a drop in the incidence of the wildly popular Angler exploit kit during second quarter--likely caused by law enforcement actions that saw the arrest of 50 cybercriminals in the UK and Russia--other exploit kits have filled in the criminal demand and kept up the breakneck pace at which ransomware is delivered. For example, Neutrino, Magnitude, and Rig continued to deliver ransomware in 2016 and bolstered the types of families it spread around, while the Hunter and Sundown kits began delivering ransomware for the first time this year.

Trend Micro detected almost 80 million ransomware threats targeting its customer base, with about 58% of those delivered through spammed email, while 40% were downloads from URLs hosting ransomware or from exploit kits leading to ransomware. 

While ransomware is often seen as a small- to midsized business or individual user problem, Trend Micro warns that the first half of 2016 also sparked a rise in ransomware built with the express purpose of attacking enterprise systems.

The report named more than half a dozen new variants of ransomware designed to go after larger business targets. This includes CRYPSAM, which infects unpatched servers through a Java-based application flaw, and CRYPRADAM AND KIMCIL, which targets files related to website hosting. Among business-related files encrypted by known ransomware families, 52% are database-related files, 19% are SQL files, 14% are web pages, 10% are tax return files, and 5% are Mac OS files.

According to a recent UBM Black Hat Attendee Survey of 250 security professionals, the most frequently cited serious new cyberthreat in the past 12 months is the rapid increase in the use of ransomware. Approximately 37% reported that as their biggest emerging concern.

Related Content:

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Jolatourte
50%
50%
Jolatourte,
User Rank: Apprentice
9/3/2016 | 4:16:13 AM
Ransomware Costs Enterprises $209M In 1H 2016
Thanks a lot for your post ! 
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.