VentureBeat June 30, 2022
VB Staff

Kaspersky’s threat intelligence team has conducted analysis into the most common tactics, techniques, and procedures (TTPs) used by 8 of the most prolific ransomware groups during their attacks. The research revealed that different groups share more than half of the cyber kill chain and execute the core stages of an attack identically.

The researchers looked at the activity of Conti/Ryuk, Pysa, Clop (TA505), Hive, Lockbit2.0, RagnarLocker, BlackByte and BlackCat. These groups have been active in the United States, Great Britain and Germany, and have targeted over 500 organizations within industries such as manufacturing, software development and small business, between March 2021 and March 2022.

The observed attacks were often predictable, following a pattern that includes compromising the corporate network or...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Health IT, Health System / Hospital, Provider, Survey / Study, Technology, Trends
Microsoft CEO says security is its No. 1 priority
AI models are inching closer to hacking on their own
What is success in cybersecurity? Failing less.
Hackers disclose personal information stolen in Change Healthcare cyberattack
Hospitals bulk up cybersecurity teams, budgets

Share This Article