Ransomware-Related Data Leaks Jump 82% in 2021

News
Cloud-based applications will be attracting more ransomware attacks soon, contended Adam Gavish, co-founder and CEO of DoControl, a provider of data access monitoring, orchestration, and remediation across SaaS applications in New York City.

CloudStrike also noticed a change in tactics by Chinese adversaries. “For years, Chinese actors relied on exploits that required user interaction,” the report explained, “whether by opening malicious documents or other files attached to emails or visiting websites hosting malicious code.”

“In contrast,” it continued, “exploits deployed by these actors in 2021 focused heavily on vulnerabilities in internet-facing devices or services.”

Cloud service providers were a preferred target of an adversary called Cozy Bear connected to Russia. During the year, the report found the group expanded its targeting of IT to cloud service providers in order to exploit trusted relationships and gain access to additional targets through lateral movement.

Cloud-based applications will be attracting more ransomware attacks soon, contended Adam Gavish, co-founder and CEO of DoControl, a provider of data access monitoring, orchestration, and remediation across SaaS applications in New York City.

“With the surge of cloud adoption, attackers have put SaaS applications in the crosshairs,” he told TechNewsWorld. “Weaponizing the many vulnerabilities that exist with SaaS applications is the next phase of advanced ransomware attacks.”

In 2021, CrowdStrike Intelligence observed adversaries continue to adapt to security environments impacted by the ongoing COVID pandemic, the report noted. These adversaries are likely to look at novel ways in which they can bypass security measures to conduct successful initial infections, impede analysis by researchers and continue tried-and-tested techniques into 2022.

Read full article
Get updates to your inbox
Our latest tips, insights, and news
DoControl - SaaS data access control - Linkedin logoDoControl - SaaS data access control - Twitter logo
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Our latest tips, insights, and news
Get updates to your inbox