This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • COVID-19
    • Coronavirus News
    • Coronavirus Blogs
    • Coronavirus and Business Continuity
    • Coronavirus and Cybersecurity
    • Economic Impact of Coronavirus
    • Coronavirus and Emergency Planning
    • Coronavirus and Telecommuting Employees
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • ESRM
    • IP Security Solutions & Technology
    • Smart Physical Security for Your Business
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Cybercriminals are Increasingly Turning to Ransomware as a Secondary Source of Income
Cyber Security NewsCyberSecurity Newswire

Cybercriminals are Increasingly Turning to Ransomware as a Secondary Source of Income

ransomware
March 4, 2020
KEYWORDS cyber security / cybersecurity / ransomware / threat detection
Order Reprints
No Comments

Cybercriminals are increasingly turning to ransomware as a secondary source of income, says a new FireEye report. The Mandiant M-Trends 2020 Report adds that cyber attacks are evolving – 41 percent of the malware families FireEye Mandiant observed in 2019 were new. 

Key findings include:

Organizations Are Detecting and Containing Attacks Faster

In the 2020 M-Trends report, the global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days. This is 28-percent lower than the 78-day median observed in the previous year. FireEye Mandiant consultants attribute this trend to organizations improving their detection programs, as well as changes in attacker behaviors such as the continued rise in disruptive attacks (e.g. ransomware and cryptocurrency miners) which often have shorter dwell times than other attack types.

Global internal and external detection times have also reduced.

Median dwell time for organizations that learned of their incident by an external party: Stands at 141 days, a 23-percent decrease since the previous M-Trends report (184 days).

Median dwell time for organizations that self-detected their incident: Stands at 30 days, a 40 percent decrease year over year (50.5 days). While internal dwell time saw the greatest level of improvement, still 12 percent of investigations continue to have dwell times of greater than 700 days.

Internal Detection Reaches A Four-year Low

Although the dwell time for intrusions identified internally by organizations has gone down, the overall percentage of self-detected security incidents versus external sources has also reduced. There has been a 12-percentage point decrease in the proportion of compromises detected internally, year-over-year. This comes after a steady increase of internal detections since 2011.

2019 is the first time in four years in which external notifications, when an outside entity informs an organization that it has been compromised, exceeded internal detections, the report says.

This shift is potentially due to a variety of factors, such as increases in law enforcement and cyber security vendor notifications, changes in public disclosure norms, and compliance changes, says the report. FireEye Mandiant feels it is unlikely that organizations’ ability to detect intrusions deteriorated, as other metrics show continued improvements in organizational detections and response.

Hundreds of New Malware Families Identified

The new report details how of all the malware families Mandiant observed in 2019, 41 percent had never been seen before. Furthermore, 70 percent of the samples identified belonged to one of the five most frequently seen families, which are based on open source tools with active development. These points demonstrate that not only are malware authors innovating, cyber criminals are also outsourcing tasks to monetize operations faster, says the report.

Also of note, the majority of new malware families impacted either Windows or multiple platforms. While FireEye Mandiant saw new malware families solely impacting Linux or Mac, this activity remains in the minority.

Increased Monetization Means More Ransomware Attacks

Of the attacks that FireEye Mandiant professionals responded to, the greatest majority (29 percent) were likely motivated by direct financial gain. This includes extortion, ransom, card theft, and illicit transfers. The second most common (22 percent) was data theft likely in support of intellectual property or espionage end goals.

The successful monetization of ransomware attacks and the availability of ransomware as a service have contributed to an increase in overall ransomware cases, notes the report. Established cybercrime groups that historically targeted personal and credit card information have also been increasingly turning to ransomware as a secondary means of generating revenue. Given the ease with which ransomware attacks can be carried out and their continued financial success for attackers, FireEye expects that ransomware will continue to be used as a secondary means for monetizing access to victim environments, says the report. 

“FireEye Mandiant has seen organizations largely improving their level of cyber security sophistication, but combatting the latest threats is still a huge challenge for them,” says Jurgen Kutscher, Executive Vice President of Service Delivery at FireEye. “There are more active groups now than ever before and we’ve seen an aggressive expansion of their goals. Consequently, it’s crucial for organizations to continue building and testing their defenses.”

A full copy of the FireEye Mandiant M-Trends 2020 report is available for download at: https://www.fireeye.com/mtrends 

Subscribe to Security Magazine

 

Email-icon-100

I want to hear from you. Tell me how we can improve.

BNP Media Owner & Co-CEO, Tagg Henderson

Related Articles

Reducing False Alarms with Audio as a Secondary Verification Source

Majority of American Business Owners Unlikely to Pay Off Cybercriminals in Ransomware Attack

Cybercriminals Increasingly Harnessing Stolen Identity Data to Launch Global Attacks

Related Products

The Database Hacker's Handbook: Defending Database Servers

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content What Is Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Subway_underground_passengers_900x550__2dck9tnqpu__
Sponsored By
Axis

How Sacramento Regional Transit District is raising rail ridership with better service and security from network solutions

In recent years, transit authorities at the Sacramento Regional Transit District (SacRT) began noticing a dramatic decline in light rail ridership.

Popular Stories

fire responsive default

Congressman Huizenga Introduces HEROES Act in Support of First Responders and Medical Professionals

coronavirus

CISA Releases Guidance on Identifying Critical Infrastructure during COVID-19

covid19

Free Security Resources and Services for COVID-19

guards 3 responsive default

COVID-19 and the Guarding Industry

SEC0819-5G-Feat-slide_900px

Secure 5G and Beyond Act of 2020 Signed Into Law

SEC-0420-Social-Most2020-360-x-184

Events

April 21, 2020

Building a GSOC for the Future of the Modern Enterprise

At the center of an organization's security operation stands its nucleus, one of the most important pieces for overall functionality: the global security operations center (GSOC). But that can look different based on goals, budget and overall vision. However, one commonality remains: the GSOC is where a variety of systems and solutions come together to provide a singular operational picture, mitigate threats and promote enhanced communication during an incident.
April 23, 2020

How IT Can Enhance Security & Video Surveillance

The physical security industry adopts datacenter information technology in bits and pieces, but not to the extent possible. This prevents organizations from making strides in reducing costs and complexity, rapidly responding to change, and delivering on the prime security directives of keeping people and property safe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-April-2020-Cover_144px

2020 April

This month in Security magazine: meet the global security team at Boston Scientific - five female professionals with diverse background and skills who are creating a best-in-class enterprise security team while ensuring the safety and security of employees, customers and patients. Also this month, we highlight Kristin Lenardson and her successful career in protective services. Security experts discuss whistleblowing, the CCPA and more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2020. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing