62% of Top Ransomware Groups Activated Remote Attacks in 2023
According to Sophos’ latest report, 62% of the most active ransomware groups in the world deliberately enable remote encryption for their attacks.
Sophos’ report entitled “CryptoGuard: An Asymmetric Approach to the Ransomware Battle,” gathered the data based on Sophos’ detected and halted ransomware attacks in 2023. The report further stated that remote encryption is used as a tactic for effective, widespread ransomware attacks within organizations, aiming to steal as much sensitive information as possible.
Daily Average of Malicious File Shared Sees 3% Increase in 2023
An average of 411,000 malicious files were shared by threat actors daily in 2023, a 3% increase compared to the year prior, according to a Kaspersky report.
Kaspersky’s report entitled “Security Bulletin: Statistics of the Year Report” also highlighted that out of the 125M malicious files shared in 2023, 24,000 of them were in the Microsoft Office and PDF formats, representing a 53% increase compared to 2022.
Integris Health Patients Report Wave of Extortion Emails
Following a confirmed cyberattack last month, Integris Health patients in Oklahoma reported extortion emails from threat actors, threatening to release their data if their demands are not met.
According to some patients’ whose accounts were affected by the attacks, the threat actors disclosed that they stole sensitive data from 2M of Integris’ patient database and gave those who sent the extortion email a deadline to settle the demands by January 5th, 2024.