Threat Index_Banner_1920 × 700
Threat Index_Banner_1920 × 700

CAMBRIDGE, Mass.Feb. 23, 2022 /PRNewswire/ — IBM (NYSE: IBM) Security today released its annual X-Force Threat Intelligence Index unveiling how ransomware and vulnerability exploitations together were able to “imprison” businesses in 2021 further burdening global supply chains, with manufacturing emerging as the most targeted industry. While phishing was the most common cause of cyberattacks in general in the past year, IBM Security X-Force observed a 33% increase in attacks caused by vulnerability exploitation of unpatched software, a point of entry that ransomware actors relied on more than any other to carry out their attacks in 2021, representing the cause of 44% of ransomware attacks.

The 2022 report details how in 2021 ransomware actors attempted to “fracture” the backbone of global supply chains with attacks on manufacturing, which became 2021’s most attacked industry (23%), dethroning financial services and insurance after a long reign. Experiencing more ransomware attacks than any other industry, attackers wagered on the ripple effect that disruption on manufacturing organizations would cause their downstream supply chains to pressure them into paying the ransom. An alarming 47% of attacks on manufacturing were caused due to vulnerabilities that victim organizations had not yet or could not patch, highlighting the need for organizations to prioritize vulnerability management.

The 2022 IBM Security X-Force Threat Intelligence Index maps new trends and attack patterns IBM Security observed and analyzed from its data – drawing from billions of datapoints ranging from network and endpoint detection devices, incident response engagements, phishing kit tracking and more –­ including data provided by Intezer.

Some of the top highlights in this year’s report include:

  • Ransomware Gangs Defy TakedownsRansomware persisted as the top attack method observed in 2021, with ransomware groups showing no sign of stopping, despite the uptick in ransomware takedowns. According to the 2022 report, the average lifespan of a ransomware group before shutting down or rebranding is 17 months.
  • Vulnerabilities Expose Businesses’ Biggest “Vice”. X-Force reveals that for businesses in EuropeAsia and MEA, unpatched vulnerabilities caused approximately 50% of attacks in 2021, exposing businesses’ biggest struggle– patching vulnerabilities.
  • Early Warning Signs of Cyber Crisis in the Cloud. Cybercriminals are laying the groundwork to target cloud environments, with the 2022 report revealing a 146% increase in new Linux ransomware code and a shift to Docker-focused targeting, potentially making it easier for more threat actors to leverage cloud environments for malicious purposes.

“Cybercriminals usually chase the money. Now with ransomware they are chasing leverage,” said Charles Henderson, Head of IBM X-Force. “Businesses should recognize that vulnerabilities are holding them in a deadlock – as ransomware actors use that to their advantage. This is a non-binary challenge. The attack surface is only growing larger, so instead of operating under the assumption that every vulnerability in their environment has been patched, businesses should operate under an assumption of compromise, and enhance their vulnerability management with a zero trust strategy.”

The “Nine Lives” of Ransomware Groups
Responding to the recent acceleration of ransomware takedowns by law enforcement, ransomware groups may be activating their own disaster recovery plans. X-Force’s analysis reveals that the average lifespan of a ransomware group before shutting down or rebranding is 17 months. For example, REvil which was responsible for 37% of all ransomware attacks in 2021, persisted for four years through rebranding, suggesting the likelihood it resurfaces again despite its takedown by a multi-government operation in mid 2021.

While law enforcement takedowns can slow down ransomware attackers, they are also burdening them with the expenses required to fund their rebranding or rebuild their infrastructure. As the playing field changes, it’s important that organizations modernize their infrastructure to place their data in an environment that can help safeguard it – whether that be on-premises or in clouds. This can help businesses manage, control, and protect their workloads, and remove threat actors’ leverage in the event of a compromise by making it harder to access critical data in hybrid cloud environments.

Vulnerabilities Become an Existential Crisis for Some
The X-Force report highlights the record high number of vulnerabilities disclosed in 2021, with vulnerabilities in Industrial Control Systems rising by 50% year-over-year. Although more than 146,000 vulnerabilities have been disclosed in the past decade, it’s only been in recent years that organizations accelerated their digital journey, largely driven by the pandemic, suggesting that the vulnerability management challenge has yet to reach its peak.

At the same time, vulnerability exploitation as an attack method is growing more popular. X-Force observed a 33% increase since the previous year, with the two most exploited vulnerabilities observed in 2021 found in widely used enterprise applications (Microsoft Exchange, Apache Log4J Library). Enterprises’ challenge to manage vulnerabilities may continue to exacerbate as digital infrastructures expand and businesses can grow overwhelmed with audit and upkeep requirements, highlighting the importance of operating on the assumption of compromise and applying a zero trust strategy to help protect their architecture.

Attackers Target Common Grounds Amongst Clouds
In 2021, X-Force observed more attackers shifting their targeting to containers like Docker – by far the most dominant container runtime engine according to RedHat. Attackers recognize that containers are common grounds amongst organizations so they are doubling down on ways to maximize their ROI with malware that can cross platforms and can be used as a jumping off point to other components of their victims’ infrastructure.

The 2022 report also sounds caution on threat actors’ continued investment into unique, previously unobserved, Linux malware, with data provided by Intezer revealing a 146% increase in Linux ransomware that has new code. As attackers remain steady in their pursuit of ways to scale operations through cloud environments, businesses must focus on extending visibility into their hybrid infrastructure. Hybrid cloud environments that are built on interoperability and open standards can help organizations detect blind spots and accelerate and automate security responses.

Additional findings from the 2022 report include:

  • Asia Leads Attacks  Experiencing over 1 in 4 attacks that IBM observed globally in 2021, Asia saw more cyberattacks than any other region in the past year. Financial services and manufacturing organizations together experienced nearly 60% of attacks in Asia.
  • First Time Caller, Long Time Phisher – Phishing was the most common cause of cyberattacks in 2021. In X-Force Red’s penetration tests, the click rate in its phishing campaigns tripled when combined with phone calls.

The report features data IBM collected globally in 2021 to deliver insightful information about the global threat landscape and inform security professionals about the threats most relevant to their organizations. You can download a copy of the 2022 IBM Security X-Force Threat Intelligence Index here

Source

24 comments
  1. I was just searching for this information for some time. After six hours of continuous Googleing, finally I got it in your website. I wonder what is the lack of Google strategy that don’t rank this type of informative web sites in top of the list. Normally the top web sites are full of garbage.

  2. fantastic points altogether, you just gained a new reader. What would you recommend in regards to your publish that you simply made a few days ago? Any sure?

  3. I am not positive where you are getting your info, but good topic. I needs to spend a while studying much more or figuring out more. Thanks for magnificent info I used to be on the lookout for this information for my mission.

  4. Your style is so unique compared to many other people. Thank you for publishing when you have the opportunity,Guess I will just make this bookmarked.2

  5. What i do not realize is if truth be told how you’re now not really much more neatly-favored than you might be now. You are so intelligent. You realize thus significantly when it comes to this matter, made me in my view believe it from a lot of numerous angles. Its like women and men are not involved except it is something to accomplish with Lady gaga! Your individual stuffs nice. Always handle it up!

  6. I have been absent for a while, but now I remember why I used to love this website. Thanks, I will try and check back more frequently. How frequently you update your site?

  7. Thank you for another magnificent article. Where else could anybody get that type of information in such an ideal way of writing? I have a presentation next week, and I am on the look for such information.

  8. I got what you mean , regards for putting up.Woh I am lucky to find this website through google. “Do not be too timid and squeamish about your actions. All life is an experiment.” by Ralph Waldo Emerson.

  9. Hey! I just wanted to ask if you ever have any issues with hackers? My last blog (wordpress) was hacked and I ended up losing many months of hard work due to no data backup. Do you have any solutions to protect against hackers?

  10. I have to get across my affection for your kind-heartedness supporting all those that need assistance with this particular theme. Your very own dedication to passing the message along has been rather beneficial and has surely empowered professionals much like me to achieve their dreams. Your warm and friendly help entails a great deal a person like me and far more to my mates. Thank you; from all of us.

  11. I got what you mean , appreciate it for posting.Woh I am happy to find this website through google. “Spare no expense to make everything as economical as possible.” by Samuel Goldwyn.

  12. Excellent post. I was checking constantly this blog and I am impressed! Extremely helpful info specially the last part 🙂 I care for such info much. I was seeking this particular information for a very long time. Thank you and best of luck.

  13. This site is known as a walk-by way of for all of the information you wanted about this and didn’t know who to ask. Glimpse right here, and also you’ll positively uncover it.

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Across the globe, Apple and its teams find new ways to give

The company’s Employee Giving program has raised over $880 million, with more…

Accelerating telco transformation in the era of AI

AI is redefining digital transformation for every industry, including telecommunications. Every operator’s…

New Cisco 800G Innovations Help to Supercharge the Internet for the Future

News Summary: Cisco’s new 28.8T / 36 x 800G line card, powered…

Mars and Microsoft work together to accelerate Mars’ digital transformation and reimagine business operations, Associate experience and consumer engagement

Mars and Microsoft work together to accelerate Mars’ digital transformation and reimagine business operations, Associate experience and consumer engagement

Apple and Major League Soccer to present all MLS matches around the world for 10 years, beginning in 2023

CUPERTINO, CALIFORNIA Apple and Major League Soccer (MLS) today announced that the Apple…

Samsung Electronics Introduces Standardized 5G NTN Modem Technology To Power Smartphone-Satellite Communication

Samsung Electronics, a world leader in advanced semiconductor technology, today announced that…

9 ways AI can interact with culture

Since 2018, Google Arts & Culture Lab has been exploring the application…

Apple lands historic first Best Picture Oscar nomination for “CODA,”and secures six Academy Award nominations including Best Actor for Denzel Washington in “The Tragedy of Macbeth” and Best Supporting Actor for Troy Kotsur in “CODA”

CUPERTINO, CALIFORNIA Apple today made history, landing six Academy Award nominations in several…