• RAGroup has increased activity by over 300% since its last known attacks in December 2023, entering the top three threat actors for the first time.
  • Industrials (31%), Consumer Cyclicals (19%), and Healthcare (11%) were the most targeted sectors.
  • North America and Europe were targets for 82% of all cases.

Ransomware attacks in March continued to break records for 2024, with global levels of attacks increasing from February. According to NCC Group's March Threat Pulse, the total cases rose to 421 from 416 in the previous month (up 1%).

Year-on-year, March ransomware attacks decreased in targeting by 8%, going from 459 to 421 attacks compared to March 2023. This was largely due to the mass exploitation of the GoAnywhere MFT vulnerability, which ransomware gang CL0P claimed responsibility for before going silent until its major MOVEit exploitation in May.

Despite the year-on-year decrease in targeting, the record-breaking 2024 monthly targeting increase indicates that we will likely observe a further activity increase in April and the remainder of the year.

New faces appear in the most prominent threat actor list.

Continuing their eight-month reign, LockBit 3.0 was responsible for 57 attacks (20%), Play 40 attacks (14%), and RAGroup 33 attacks (11%).

Contrary to LockBit, which experienced almost a 50% decline in activity between February and March, Play has experienced a surge in activity, going from 26 attacks in February to 40 in March, an increase of nearly 67%.

RAGroup also returned to prominence with a bang after no observable activity in either January or February of 2024. The group broke into the top three for the first time, with an increase of 300% from their last known attacks in December 2023.

Black Basta, Medusa, and Cactus were in fourth, fifth, and sixth positions with 32 attacks (11%), 22 attacks (8%), and 20 attacks (7%), respectively.

Play targets ransomware attacks in North America.

For the third time in 2024, North America and Europe dominated the total number of regional ransomware attacks, with over 82% of cases.

North America witnessed over 50% of attacks, with Lockbit claiming 14% (31) of these, down from 55 attacks in February. This is likely due to recent law enforcement actions potentially impacting their operation. Play delivered the same share of attacks to this region as Lockbit, up from 8% (18) in February.

For the remaining 18%, we have Asia with 40 attacks, South America with 16, Oceania with 9, and finally, Africa and Undisclosed with just 9 and 4 victims, respectively. This is mostly consistent with last month, with just a 1% difference between some of the regions.

Ransomware groups cause sector shake-up.

March's ransomware targeting by sector saw Industrials with 129 attacks (31%) and Consumer Cyclicals with 75 attacks (19%) remaining in first and second position.

Outside of the top two sectors, there has been a significant reshuffle in their positioning compared with February.

Healthcare moved from fourth in February to third in March with 45 attacks (11%), while Consumer Non-Cyclicals dropped from third to fifth with 35 attacks (8%). Next, Technology jumped from sixth position in February to fourth in March, accounting for 41 attacks (10%), representing a 41% increase in the sector's targeting (from 29 attacks).

Due to a 64% increase in targeting (from 14 to 23 attacks), the Financials sector moved from eighth in February to sixth this month, accounting for 5% of the attack volume. Simultaneously, a 44% decrease in targeting (from 32 to 18 attacks) resulted in the Basic Materials sector falling from fifth in February to eighth in March.

The remaining three sectors (Government Activity, Academic & Educational Services, and Real Estate) experienced minor changes in positioning and together accounted for 32 attacks (8%) of the overall monthly output.

Spotlight: Contests and Competitions

Most of the focus within the ransomware landscape often focuses on the malware groups at play. However, criminal creativity is essential to develop new strategies in order to evade detection and punishment, carry out illicit operations, and exploit loopholes.

Contests, such as XSS' software development contest, aim to bring together the community and support in developing new malicious malware.

Attachments

  • Original Link
  • Permalink

Disclaimer

NCC Group plc published this content on 24 April 2024 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 24 April 2024 12:27:09 UTC.