
Know if a newly announced vulnerability will affect your organization, as well as know your systems and configurations.With this year likely to feature increased attacks, NCC Group suggests:

JACK GROUP RANSOMWHERE HOW TO
How to defend against accelerating ransomware threats The company previously reported the highest number of ransomware cases in January and February than in the past 3 years.

We are keeping a close eye on the actor as it evolves,” he said.

“If operations remain consistent, we can expect them to remain a prevalent threat throughout the year. Matt Hull, global head of threat intelligence at NCC Group, said the huge surge in ransomware attacks last month is likely to be par for the course this year. Pace of ransomware attacks likely to remain brisk Attacks on onstruction and engineering sectors increased 16% ( Figure C).įigure C Image: NCC Group.Attacks on machinery, tools, heavy vehicles, trains and ships increased 127%.
JACK GROUP RANSOMWHERE PROFESSIONAL
JACK GROUP RANSOMWHERE SOFTWARE
Must-read security coverageġ0 best antivirus software for businesses in 2023 NCC Group said the increase in attacks by CL0p reflected its exploitation of a vulnerability in Fortra’s GoAnywhere managed file transfer used by thousands of organizations around the world, causing large-scale disruption. Cl0p accessed GoAnywhere MFT vulnerability to attack organizations The non-aligned attack group Royal, which appeared in September last year targeting the healthcare sector, was the third most active attacker with a 106% increase in attacks in March versus February ( Figure B).įigure B Image: NCC Group. SEE: The Royal scam - threat actors promise challenging 2023 The group’s victims declined 25% from February, per NCC. NCC Group said March 2023 was the second month since September 2021 in which LockBit had not been the top ransomware threat actor. LockBit 3.0 came in second, accounting for 21% of attacks. The hacking group has been around since 2019, when it successfully attacked major companies like Hitachi, Shell and several other enterprises. NCC Group said it is also the first time Cl0p has been the top RaaS for cybercriminal groups.Ĭl0p, a Russian linked entity specializing in double extortion, exfiltrates data then threatens to release it if ransom isn’t forthcoming. Ransomware-as-a-Service provider Cl0p, the most active threat actor, accounted for 28% of all March victims. In its monthly threat report, NCC Group reported a 91% increase in ransomware attacks in March versus February and a 62% increase versus the month last year - the highest number of monthly ransomware attacks the group has ever measured ( Figure A).įigure A Image: NCC Group.

Ransomware attacks have spiked, according to the NCC Group’s Global Threat Intelligence Team. New threat group Cl0p is behind the increase as it exploited vulnerabilities in GoAnywhere file transfer manager. Ransomware attacks skyrocketed last month according to the new monthly cybersecurity report by NCC Group. Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities
