Group-IB – Telegram
Group-IB
2.21K subscribers
745 photos
26 videos
2 files
531 links
Your daily source of cybersecurity news brought to you by Group-IB, one of the global industry leaders.
Download Telegram
#CyberCrimeCon21 #report #cybercrime #HTCT

The overall size of initial access market hits $7.2 mln💵

In H2 2020-H12021, the market of corporate initial access continued to flourish and grew by almost 16% from $6,189,388 to $7,165,387. Here are some other figures proving this explosive growth:

🔹The number of offers to sell access to companies almost tripled over the review period: from 362 to 1,099.
🔹The number of initial access brokers skyrocketed from 86 active brokers to 262, with 229 new players joining the roster.
🔹The number of industries exploited by initial access brokers surged from 20 to 35, which indicates that cybercriminals are becoming aware of the variety of potential victims. Most companies affected belonged to the manufacturing, education, and financial services.
🔹The number of countries where cybercriminals broke into corporate networks increased from 42 to 68. US-based companies were the most popular among sellers of access to compromised networks, followed by France and the UK.
🔹Five brokers make 35% of all the profit from access sale in the underground.

Download link -> https://bit.ly/3pjvxPc
#CyberCrimeCon21 #report #cybercrime #HTCT

Access brokers: regional profiles 🌎

Let's take a closer look at the situation with the sales of access to corporate networks in various regions.

🔹In APAC alone, the total cost of all the accesses to the region’s companies available in the underground totaled $3.3 million. Most of the accesses on the sale belonged to organizations from Australia, India and China.

🔹European companies were among frequent targets of access brokers as well. The total cost of all the accesses to the region’s companies offered for sale in the #underground totaled $590,095 in the review period. French companies were the most popular lot for sellers of access to compromised networks, followed by the UK and Italy.

🔹In the Middle East, the total cost of all the accesses to the region’s companies available in the underground accounted for $247,836. Most of the accesses on the sale belonged to organizations from the UAE, followed by Israel and Turkey.

Download the report for more details -> https://bit.ly/3pjvxPc
This media is not supported in your browser
VIEW IN TELEGRAM
Today, at #CyberCrimeCon, Group-IB Head of Digital Forensics and Malware Analysis Lab Oleg Skulkin revealed his findings about the recent developments in the #ransomware market.

The full session's recording will soon be available at ▶️ https://cybercrimecon.com
#report #cybercrime #HTCT #ransomware

Group-IB presents the second volume of its Hi-Tech Crime Trends 2021/2022 report “Corporansom: threat number one⚡️⚡️⚡️

In the first 11 months of 2021, more than 60% of all the incidents investigated by Group-IB concerned ransomware. This number is expected to grow, with the number of public affiliate programs growing by 23% in H2 2020 – H1 2021 compared to the corresponding period a year earlier.

Over the review period, RaaS gangs increased the conversion by posting compromised data online on their Data Leak Sites (DLS). It has become very popular, with the number of victims whose data has been published on DLSs having grown by 935% in H2 2020 – H1 2021.

The report represents the first attempt to provide a retrospective analysis of how the ransomware cyber empire evolved and shed light on how businesses worldwide lose millions of dollars to cybercriminals. In this report, we look into how and why the ransomware industry has developed, provide in-depth analyses of certain affiliate programs from within, and share statistics on the countries and industries that are attacked most often.

Download link -> https://bit.ly/31NMsRX
#report #cybercrime #HTCT #ransomware

Let's take a look at the “Corporansom: threat number one” highlights⬇️

🔹According to data leak sites, in 2021, the most active #ransomware groups were #Conti, #Lockbit and #Avaddon.

🔹Almost half of the companies whose data was released on DLS in 2021 originate from the US🇺🇸, followed by Canada🇨🇦 and France🇫🇷.

🔹According to the DLS data, the main industries targeted in 2021 were #manufacturing, real estate, and #transportation. In 2020, the situation was almost the same, which suggests that attackers mainly target the same types of companies that they believe to be the most profitable.

🔹In H2 2020 – H1 2021, #RaaS gangs increased the conversion by posting compromised data online on their Data Leak Sites (#DLS). It has become very popular, with the number of victims whose data has been published on DLSs having grown by 935%.

🔹SoftPerfect Network Scanner, Cobalt Strike Beacon, and ADFind were the top 3 most popular tools encountered by Group-IB experts in their response to #ransomware attacks.

Download the report now for more insights -> https://bit.ly/31NMsRX