Heimdal
article featured image

Contents:

New Chainalysis warns of ransomware payments raised above above $1.1 billion in 2023 and reached a new record. The $983 million previous peak was set in 2021, while in 2022 the ransomware payments dropped to $567.

Chainalysis puts the unusual dropping on threat actors changing focus to politically motivated cyberattacks, due to the war in Ukraine.

There were, reportedly, other two important factors that lead to a decline in ransomware payment in 2022:

  • some of the victims refused to pay ransom
  • the FBI succeeded to infiltrate the Hive ransomware strain

Source – Chainalysis Report

However, the numbers went back up in 2023 and researchers expect them to continue growing.

Ransomware-as-a-Service continued to expand, making it easier for malicious actors to perform ransomware attacks. Also, the attackers targeted major institutions and critical infrastructure.

Chainalysis considers Cl0p to be one of the most prolific ransomware gangs. Cl0p threat actors are notoriously focusing on large gaining and targeted thousands of organizations worldwide. The report shows that almost half of the cashed ransom in June and July 2023 went to Cl0p.

A top five ransomware groups for 2023, according to cashed ransom payments, includes Cl0p, ALPHV/Blackcat, Play, LockBit, and BlackBasta.

2 main ransomware strategies

The Chainalysis report revealed that the major ransomware threat groups use different strategies to achieve their goals.

  • Cl0p goes for big, but less frequent earnings. Their attacks are less frequent, but target organizations that would pay more. They exploited use zero-day vulnerabilities to reach their goals.
  • ALPHV/Blackcat works as a RaaS strain. Their carefully chosen affiliates spread the malware and so the number of attacks that use Blackcat ransomware is higher. These ones too prefer attacking big targets, so they can cash larger sums. Phobos seems to use the same business model as Blackcat. This means they are also a Ransomware-as-a-Service (Raas). There`s frequent attacks but lower payments.

Another report, issued by Coverware, showed a decrease in ransom payments for 2023 Q4. However, the decrease is compared to the same year`s Q1, so we can`t actually consider it as a trend.

Although the numbers in 2022 were optimistic, the battle against ransomware crime obviously continues. In the context, companies should adopt a layered defense model to keep data safe and prevent ransomware attacks. Choosing cybersecurity solutions that use end-to-end encryption to protect sensitive data is also a best practice.

If you liked this article, follow us on LinkedIn, Twitter, Facebook, and Youtube, for more cybersecurity news and topics.

Heimdal Official Logo
Neutralize ransomware before it can hit.

Heimdal™ Ransomware Encryption Protection

Specifically engineered to counter the number one security risk to any business – ransomware.
  • Blocks any unauthorized encryption attempts;
  • Detects ransomware regardless of signature;
  • Universal compatibility with any cybersecurity solution;
  • Full audit trail with stunning graphics;
Try it for FREE today 30-day Free Trial. Offer valid only for companies.
Author Profile

Livia Gyongyoși

Communications and PR Officer

Livia Gyongyoși is a Communications and PR Officer within Heimdal®, passionate about cybersecurity. Always interested in being up to date with the latest news regarding this domain, Livia's goal is to keep others informed about best practices and solutions that help avoid cyberattacks.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE