Ransomware is the de facto threat organizations have faced over the past few years. Threat actors were making easy money by exploiting the high valuation of cryptocurrencies and their victims’ lack of adequate preparation.
Think about bad security policies, untested backups, patch management practices not up-to-par, and so forth. It resulted in easy growth for ransomware extortion, a crime that multiple threat actors around the world perpetrate.
Something’s changed, though. Crypto valuations have dropped, reducing the monetary appeal of ransomware attacks due to organizations mounting a formidable defense against ransomware.
Threat actors have been searching for another opportunity – and found one. It’s called data exfiltration, or exfil, a type of espionage causing headaches at organizations worldwide. Let’s take a look.
The threat to reveal confidential information
Information exfiltration is rapidly becoming more prevalent. Earlier this year, incidents at Nvidia, Microsoft, and several other companies have highlighted how big of a problem it’s become – and how, for some organizations, it may be a threat that’s even bigger than ransomware.
Nvidia, for example, became entangled in a complex tit-for-tat exchange with hacker group Lapsus$. One of the biggest chipmakers in the world was faced with the public exposure of the source code for invaluable technology, as Lapsus$ leaked the source code for the company’s Deep Learning Super Sampling (DLSS) research.
When it comes to exfil extortion, attackers do not enter with the primary aim of encrypting a system and causing disruption the way that a ransomware attacker does. Though, yes, attackers may still use encryption to cover their tracks.
Instead, attackers on an information exfiltration mission will move vast amounts of proprietary data to systems that they control. And here’s the game: attackers will proceed to extort the victim, threatening to release that confidential information into the wild or to sell it to unscrupulous third parties.
Exfil can be far more damaging than ransomware
For victims, it’s a serious threat because threat actors can acquire the keys to the safe. Competitors can use trade secrets to produce copies of products or aid in their R&D efforts or information that could lead to a costly public relations disaster.
Either way – public exposure of information can be a threat greater than ransomware because ransomware demand can be resolved by paying up (or by retrieving backups). Leaked information – well – that’s something that may be unfixable. It’s easy to see why threat actors can find extortion based on information leakage to be an even more attractive target than mere ransomware.
It’s worth noting that part of the drive for this type of attack also lies in the current state of world affairs which have created a strong demand for intellectual property transfer across opposing geopolitical lines. There’s also arguably greater leniency against actors attacking “the other side,” even when local judicial systems consider the attack a crime.
In for the long haul
There’s another theme that’s emerging in the exfil space. It’s interesting to note something that cybersecurity teams have known for a long time: for malicious actors, it’s beneficial for an attacker to stay undetected for an extended period of time.
Staying quietly, rather than flashing “you’ve been hacked” messages on computer screens, allows attackers to “see” more information flows in the network and to do more in-depth reconnaissance of systems after gaining entry.
More time in the network means attackers can identify more desirable targets than just a simple ransomware deployment. Patient threat actors could do far more harm; if they remain undetected.
Protective measures still work
What can organizations do to guard against extortion? Well, the same cybersecurity principles continue to count, even more so given the greater risk.
After so many years of alarming headlines, most organizations have deployed ransomware protection in the form of better backup strategies, more fine-tuned and granular data access, and better rules and monitoring for detecting unwanted file changes.
It’s made ransomware attacks harder, often acting as a deterrent against attackers simply looking for easy targets. Protecting against malware infections or information exfiltration starts with properly maintaining infrastructure.
Seamless patching remains at the core
That includes keeping systems up to date with the latest patches. It’s not just a guard against ransomware, of course: patched systems also close the easy paths to critical business information so that threat actors are not in a position to siphon off critical business information.
Suppose your organization is still relying on patching operations that involve maintenance windows. In that case, it’s worth considering whether patching is happening fast enough to protect your organization against information exfiltration threats.
Can’t patch fast enough? Take a look at live patching. TuxCare’s KernelCare Enterprise helps you stay protected against emerging threats immediately, with little lag between threat emergence and mitigation. With one simple, affordable addition to your cybersecurity arsenal, you can put in place the simplest and most important line of defense against attackers looking to hold you for ransom.
Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.