The total incidents jumped from 188 to 265, an increase of 41%. This makes November the most active month for ransomware attacks since April.
Analysis from NCC Group’s Global Threat Intelligence team has revealed a staggering 41% increase in ransomware attacks this month. November saw a resurgence of threat actor groups, with their activity intensifying as the holiday season approached.
Lock bit 3.0 was knocked off the top spot as threat actor groups Royal and Cuba claimed first and second place, respectively, accounting for 16% and 15% of all attacks in November.
“This month, we observed some interesting changes, with Lock bit 3.0 being pushed back to third place and replaced by the re-emergence of Royal and Cuba. The reduced operation may suggest the group could be disbanding, but we will keep a close eye on any developments in this area,” says Matt Hull, Global Head of Threat Intelligence at the NCC Group.
Royal, first tracked by NCC Group in January 2022, is a sophisticated ransomware threat actor group composed of several experienced cybercriminals. The group has been active since then, and their activity has only increased throughout the year, culminating with them claiming the top spot for ransomware attacks in November.
Cuba is a ransomware threat actor group that has been active for the past two years and is responsible for several sophisticated, high-profile attacks. The group has shown to be successful in their extortion attempts, with its ransomware demand exceeding US$60 million. In November, they took second place behind Royal as the most active ransomware threat actor group.
November saw a dramatic rise in Distributed Denial of Service (DDoS) attacks, with 3,648 attacks observed over the month. This is a significant increase from October, when 2,754 DDoS attacks were reported.
Analysis from NCC Group’s Global Threat Intelligence team has revealed a startling 75% increase in supply chain compromise opportunities and intellectual property attacks in the last month.
This surge in malicious activity is likely attributed to threat actor groups seeking to take advantage of digital vulnerabilities as organisations grapple with the disruptions caused by the pandemic.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...