December 28, 2022
2 mins read

Deeper ransomware attacks may put firms at greater threat

The goal of pseudo ransomware, also referred to as wiperware, is to destroy the victim’s systems rather than offer the opportunity to decrypt them…reports Asian Lite News

With the ransomware-as-a-service (RaaS) business model taking off, Indian organisations across the spectrum, after the massive AIIMS attack, will need to be more alert and ready to face aggressive cyber attacks.

According to Barracuda Networks, a leading provider of cloud-first security solutions, a new generation of smaller and smarter gangs will steal their limelight in 2023.

During the year, organisations will experience an increased frequency of ransomware attacks with new tactics, the company said on Tuesday.

“In 2023, organisations need to be ready to be targeted by every kind of cyberthreat, regardless of their size or industry sector. As existing authentication methods are challenged by attackers, security practitioners need to look at alternatives, and we expect to see password-less and FIDO U2F (Universal 2nd Factor) single security key technology receiving a lot of consideration,” said Parag Khurana, Country Manager, Barracuda Networks India.

The growing use of artificial intelligence (AI) in threat detection will make a significant difference to security, and “we expect to see more companies invest in 24/7 human-led threat hunting and response, making use of an expert SOC-as-a-Service if they don’t have the resources in house,” he added.

In 2023, “wiperware” emanating from Russia will likely spill over into other countries as geopolitical tensions continue.

The goal of pseudo ransomware, also referred to as wiperware, is to destroy the victim’s systems rather than offer the opportunity to decrypt them.

This form of cyberattack is often geopolitical in nature.

In 2022, there were 21,000 Common Vulnerabilities and Exposures (CVEs) registered. Many of them were classed as ‘critical’, and many were actively exploited by attackers.

“There were also a number of popular third-party software libraries that had critical vulnerabilities reported. Organisations need to have a team in place ready to patch software and remediate as soon as possible,” said the report.

2022 was the year of the supply chain attack with a large number of high-profile incidents occurring around the world and it has led more attackers to look for the weakest link in attacking companies.

“We have seen impersonation techniques and spear phishing attacks constantly evolve and with multi-factor authentication (MFA) fatigue attacks, they are having more and more success,” said the report.

ALSO READ-The Guardian hit by ransomware attack

Previous Story

Air India issues Covid norms for flyers from UAE  

Next Story

‘Pathaan’ makers reveal name of John Abraham’s character

Latest from -Top News

UK-Kenya defence partnership deepened

Defence Secretary met with Agnes Wanjiru’s family to offer condolences, fulfilling his commitment and making him the first UK Minister to meet with them In a historic and emotionally charged visit to

South Africa hosts virtual meeting of G20 Sherpas

During the meeting, Zane Dangor spoke about the importance of continuing to work with multilateral institutions, including the United Nations, to address global challenges South Africa hosted the second virtual meeting of

WFP warns as Sudan war enters third year

The civil war began on April 15, 2023, amid a power struggle between the Sudanese army and the leader of a powerful rival militia called the Rapid Support Forces The conflict, which
Go toTop

Don't Miss

Hacker encrypting data in ransomware attack

Despite this increase, the sector still has one of the

FBI to treat ransomware incidents as terror attacks

President Joe Biden said last week that his administration was