Read Time:1 Minute, 47 Second

The total incidents jumped from 188 to 265, an increase of 41%. This makes November the most active month for ransomware attacks since April.

Analysis from NCC Group’s Global Threat Intelligence team has revealed a staggering 41% increase in ransomware attacks this month. November saw a resurgence of threat actor groups, with their activity intensifying as the holiday season approached.

Lock bit 3.0 was knocked off the top spot as threat actor groups Royal and Cuba claimed first and second place, respectively, accounting for 16% and 15% of all attacks in November.

“This month, we observed some interesting changes, with Lock bit 3.0 being pushed back to third place and replaced by the re-emergence of Royal and Cuba. The reduced operation may suggest the group could be disbanding, but we will keep a close eye on any developments in this area,” says Matt Hull, Global Head of Threat Intelligence at the NCC Group.

Royal, first tracked by NCC Group in January 2022, is a sophisticated ransomware threat actor group composed of several experienced cybercriminals. The group has been active since then, and their activity has only increased throughout the year, culminating with them claiming the top spot for ransomware attacks in November.

Cuba is a ransomware threat actor group that has been active for the past two years and is responsible for several sophisticated, high-profile attacks. The group has shown to be successful in their extortion attempts, with its ransomware demand exceeding US$60 million. In November, they took second place behind Royal as the most active ransomware threat actor group.

November saw a dramatic rise in Distributed Denial of Service (DDoS) attacks, with 3,648 attacks observed over the month. This is a significant increase from October, when 2,754 DDoS attacks were reported.

Analysis from NCC Group’s Global Threat Intelligence team has revealed a startling 75% increase in supply chain compromise opportunities and intellectual property attacks in the last month.

This surge in malicious activity is likely attributed to threat actor groups seeking to take advantage of digital vulnerabilities as organisations grapple with the disruptions caused by the pandemic.

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Mass Exploitation Report Reveals Previous post 2022 Mass Exploitation Report Reveals Threat Detection Events in 2022
META Next post Mark Zuckerberg and Meta Seem to Hold Very Disparate Views About Deep Fakes