Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint //

Privacy

5/2/2018
03:00 PM
50%
50%

Ransomware Attacks Jumped 400% Worldwide in 2017

WannaCry led the pack all year, new F-Secure report says.

WannaCry helped boost the volume of ransomware attacks in 2017 dramatically, representing 90% of all ransomware detection reports. Overall, ransomware attacks increased by 400% from 2016, new data from F-Secure shows.

The number of new ransomware variants also spiked by 62%, with 343, and aside from WannaCry, Locky, Mole, Cerber, and CryptoLocker were the most commonly used ransomware families. But according to F-Secure, the overall use of ransomware declined in the second half of 2017. 

"The last couple of years saw cybercriminals developing lots of new kinds of ransomware, but that activity tapered off after last summer. So it looks like the ransomware gold rush mentality is over, but we already see hard core extortionists continuing to use ransomware, particularly against organizations because WannaCry showed everyone how vulnerable companies are," says F-Secure Security Advisor Sean Sullivan. Cryptomining also took hold, he says.

Read more here.

 

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/3/2018 | 9:18:14 AM
Increase in lack of Backup and Restore plans
ALSO jumped 400% last year as most of the Ransomware stories involved firms and entities that LO AND BEHOLD had zero ideas on how to restore from a failure. 
News
Emotet Takedown: Short-Term Celebration, Long-Term Concerns
Kelly Sheridan, Staff Editor, Dark Reading,  2/8/2021
News
Microsoft Says It's Time to Attack Your Machine-Learning Models
Robert Lemos, Contributing Writer,  2/4/2021
Commentary
SolarWinds Attack Reinforces Importance of Principle of Least Privilege
Yash Prakash, Chief Strategy Officer,  2/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I said I wanted 'fish' for dinner, he thought I said 'phish'.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36246
PUBLISHED: 2021-02-19
Amaze File Manager before 3.5.1 allows attackers to obtain root privileges via shell metacharacters in a symbolic link.
CVE-2021-26746
PUBLISHED: 2021-02-19
Chamilo 1.11.14 allows XSS via a main/calendar/agenda_list.php?type= URI
CVE-2021-27405
PUBLISHED: 2021-02-19
A ReDoS (regular expression denial of service) flaw was found in the @progfay/scrapbox-parser package before 6.0.3 for Node.js.
CVE-2019-25024
PUBLISHED: 2021-02-19
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
CVE-2021-27403
PUBLISHED: 2021-02-19
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow cgi-bin/te_acceso_router.cgi curWebPage XSS.