As organizations face increasing ransomware activity in the final months of 2024, the importance of maintaining robust cybersecurity strategies has never been clearer. Understanding how threat actors evolve their tactics is crucial to protecting critical data and systems. In this month’s Threat Debrief, we examined ransomware group activity from November 1 to November 30, uncovering 647 claimed victims across their leak sites.
Now, let’s explore some notable news and events since our last issue:
malloc
, memmove
, and memcmp
to execute its code, thereby reducing the likelihood of detection by traditional antivirus and endpoint detection and response (EDR) solutions, which often rely on identifying disk-based signatures and processes. Ymir is typically deployed after RustyStealer compromises systems, stealing credentials and enabling further attacks. The ransomware uses the ChaCha20 encryption algorithm and appends the extension .6C5oy2dVr6
to affected files.SystemSettingsAdminFlows
to disable defenses..bianlian
extension to compromised files. Instead, BianLian employs PowerShell scripts and Rclone to steal data. A recent advisory by CISA highlights the group’s updated tactics.Bitdefender’s Threat Debrief analyzes data from ransomware leak sites, where attacker groups publicize their claimed number of compromised companies. This approach provides valuable insights into the overall activity of the RaaS market. However, there’s a trade-off; while it reflects attackers’ self-proclaimed success, the information comes directly from criminals and might be unreliable. Additionally, this method only captures the number of claimed victims, not the actual financial impact of these attacks.
Ransomware gangs prioritize targets where they can potentially squeeze the most money out of their victims. This often means focusing on developed countries. Now, let’s see the top 10 countries that took the biggest hit from these attacks.
The Bitdefender Threat Debrief (BDTD) is a monthly series analyzing threat news, trends, and research from the previous month. Don’t miss the next BDTD release, subscribe to the Business Insights blog, and follow us on Twitter. You can find all previous debriefs here.
Bitdefender provides cybersecurity solutions and advanced threat protection to hundreds of millions of endpoints worldwide. More than 180 technology brands have licensed and added Bitdefender technology to their product or service offerings. This vast OEM ecosystem complements telemetry data already collected from our business and consumer solutions. To give you some idea of the scale, Bitdefender Labs discover 400+ new threats each minute and validate 30 billion threat queries daily. This gives us one of the industry’s most extensive real-time views of the evolving threat landscape.
We would like to thank Bitdefenders Vlad Craciun, Mihai Leonte, Gabriel Macovei, Andrei Mogage, and Rares Radu (sorted alphabetically) for their help with putting this report together.
tags
Jade Brown is a threat researcher at Bitdefender. A cybersecurity thought leader who is passionate about contributing to operations that involve cybersecurity strategy and threat research, she also has extensive experience in intelligence analysis and investigation.
View all postsDon’t miss out on exclusive content and exciting announcements!