Trending

Cybleblogs-Q4-2022-Ransomware-Analysis

Cyble’s Q4-2022 Ransomware Analysis

Get a glimpse into Cyble Research & Intelligence Lab's Q4-2022 Ransomware Report detailing our findings over the last quarter

A glimpse of our findings on Ransomware activity in the last Quarter

Cyble Research & Intelligence Labs (CRIL) closely monitors, tracks, and analyzes current and emerging ransomware threats across the globe. Our Q4-2022 ransomware report contains our observations around critical ransomware statistics and trends, major attacks, and common Tactics, Techniques, and Procedures (TTPs) observed last quarter.

We observed a net rise in Quarter on Quarter Ransomware activities in Q4-2022. This is in stark contrast to the drop we observed in Q3-2022. Ransomware continues to pose a formidable threat to individuals, organizations, and even governments. Our research indicates a 100 percent increase in high-net-worth companies targeted in Q4, compared to Q3-2022.  

In our Q3-2022 report, we predicted that MSMEs would be a critical target for Ransomware groups in the future. This claim was validated by our observations which indicated that multiple small-medium scale industries fell victim to supply chain attacks executed by ransomware groups. Notable examples of this include:

  • LOCKBIT ransomware group targeting multiple businesses in New Zealand after the exploitation of Mercury IT and posting the details on their leak site.
  • Play ransomware group targeted multiple Swedish entities operating in the Transportation and Logistics sector by attacking their common IT service provider.

In our Q1-2022 ransomware report, the Conti Ransomware group’s source code was leaked, which we predicted would be leveraged by new ransomware groups to carry out their activities. This prediction was also validated in Q4-2022 with the emergence of several new ransomware families, including Putin Team, BlueSky, ScareCrow, and Meow, which are all based on the leaked Conti source code, as we cover in detail in this quarter’s report.

Ransomware Activity – Q4 2022 vs Q4-2021

Prominent ransomware families have increasingly been shifting towards using Rust or GoLang-based binaries, with several new strains such as RansomEXX, Play, and Qilin adopting this trend in Q4-2022. This shift towards cross-platform languages was observed and predicted to become more common in our Q2-2022 Ransomware Report.

Some of the major findings from Q4-2022 that you can read about in our report are:

report-ad-banner
  • 594 victims were publicly disclosed by ransomware groups, with United States (US) corporations continuing to be the most affected.
  • While Services & Manufacturing sectors were the worst hit, we witnessed a significant increase in attacks on the Education sector. The BFSI sector, meanwhile, appeared more resilient toward ransomware attacks in 2022.
  • Royal ransomware dethroned LOCKBIT to become the most active ransomware group in the United States this quarter. This drop in the victim count of LOCKBIT could be attributed to the recent arrest of one of their affiliates in Canada.
  • LOCKBIT was the second most active ransomware group in the United States this quarter. However, the victim count and stature of the organizations targeted by the ransomware group has declined since July 2021.
  • We monitored several new players on the ransomware scene in Q4-2022 – Royal, Play, Qilin, Putin Team, Mallox, and Nokoyawa.
  • This quarter, multiple ransomware groups were observed adopting intermittent encryption to speed up the encryption process and evade detection.

The United States continued to be the most targeted country this quarter, followed by the UK and Canada, indicating that sophisticated Threat Actors have the capability and willingness to target high-profile organizations to extract a bigger ransom.

LOCKBIT has continued to be the most active ransomware group worldwide, despite a fall in its victim count. We have also observed their tactics shifting to target lower-profile targets such as supply chains instead of going after large organizations or Govt. entities, indicating an increased level of caution in the wake of recent Law Enforcement actions and Regulations against cybercriminal activities.

A lot of new ransomware groups are also stepping into the fore. In our earlier reports, we commented on how other TAs would leverage the leak of the Conti Ransomware group’s source code to create their own ransomware variants. We are seeing this in action now, with new players such as Royal, Putin Team, and Nokosawa also making a name for themselves in the Ransomware community.

This is just a teaser of everything you can find in our Q4-2022 ransomware report. We highly encourage you to download it to get additional, specific, actionable insights such as the geographies targeted, the industries facing disproportionate levels of Ransomware activity, and updated TTPs of known ransomware groups as they adapt to the current threat and cybersecurity landscape.

Download our Q4-2022 Ransomware Report

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading