fbpx

Ransomware Deployment Speed 24 hours of access now: Secureworks report

Ransomware acting within 24 hours of access now: Secureworks report

Rapid Ransomware Threats Demand Swift Action

The latest Secureworks Threat Report highlights a startling fact: Ransomware can compromise systems in under 24 hours. Cybercriminals are advancing quickly, with half of ransomware attacks occurring on the day of initial access.

Global Cyberthreats Evolve

Secureworks’ Counter Threat Unit pinpoints the growth of “name and shame” tactics, where attackers publicize victims’ data online. Active ransomware groups, notably from Russia, target diverse sectors.

Defending Against Cyber Threats

Cybercriminals adapt despite takedowns and sanctions. Notable threats, like GOLD MYSTIC, persist and evolve, introducing new ransomware groups.

Understanding Attack Vectors

The report identifies three main access methods for ransomware: exploit scanning, stolen credentials, and phishing. Over half of the recent malware spread through deceptive emails.

Geopolitical Influences on Cybersecurity

State-sponsored cyber threats from China, Russia, Iran, and North Korea remain prevalent, with North Korean entities netting $2.3 billion in cryptocurrencies from May 2017 to May 2023.

Proactive Cybersecurity Measures

To combat these threats, Secureworks suggests:

  • Deploying robust firewalls
  • Using antivirus software to detect and eliminate malware
  • Backing up data regularly for recovery without ransom payments

For additional ransomware prevention tactics, consult CISA’s guidelines.

Read the full Secureworks Threat Report.

Scroll to Top