The world of cybercrime and ransomware never stands still, and a new report from WithSecure shows more advertised data leaks in the first nine months of this year than all of 2022.
‘New’ groups accounted for about a quarter of all the leaks, with Akira and 8base being particularly prominent sources.
A new analysis of data leaked on sites operated by these multi-point extortion ransomware operators indicates that many new groups have become active in this space during 2023. Out of the 60 multi-point extortion ransomware gangs whose activities WithSecure has tracked during the first nine months of 2023, 29 are new.
These new groups largely follow playbooks established by existing operators, but play a key role in sustaining the amount of ransomware attacks facing organizations.
WithSecure threat intelligence analyst Ziggy Davies says, “Code and other aspects of one particular cyber crime operation end up getting used elsewhere because groups and their members often recycle the same resources when they change who they work for or with. Many of the new groups we’ve seen this year have clear lineage in older ransomware operations. For example, Akira and several other groups share many similarities with the now-defunct Conti group, and are likely former Conti affiliates.”
Among other findings, in the first three quarters of 2023, there has been a 50 percent increase in data leaks from ransomware groups compared to the same period last year. Lockbit accounted for the biggest share of the leaks (21 percent), with the five groups with the most leaks (8Base, Alphv/BlackCat, Clop, LockBit, and Play) accounting for over 50 percent of the total.
“Ransomware remains an effective moneymaker for cyber criminals, so they’ll mostly stick to the same basic playbook rather than come up anything really new or unexpected. This makes them pretty predictable, which is good for defenders because they know what they’re up against,” adds Davies.
You can find out more on the WithSecure blog.