Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity News

Banking industry sees 1318% increase in ransomware attacks in 2021

By Maria Henriquez
hacker-attack-breach-freepik.jpg
September 20, 2021

Ransomware was a significant threat to global organizations in the first half of 2021, but it was not the only one, according to a new Trend Micro report.


Ransomware remained the standout threat in the first half of the year as cybercriminals continued to target big-name victims. Working with third parties to gain access to targeted networks, cybercriminals used Advanced Persistent Threat tools and techniques to steal and encrypt victims’ data, the report shows.


The banking industry was disproportionately affected, experiencing a 1,318% year-on-year increase in ransomware attacks in the first half of 2021. Other key findings include:

  • Business email compromise (BEC) attacks increased by 4%, potentially due to new COVID-19 opportunities for threat actors.
  • Cryptocurrency miners became the most detected malware, surging ahead of WannaCry and web shells in recent months.
  • The Zero Day Initiative detected 770 vulnerabilities, a slight (2%) drop from 1H 2020.
  • A total of 164 malicious apps related to COVID-19 scams were detected, 54% of which impersonated TikTok.


The report’s overall findings highlight the effectiveness of – an increasing need for – a holistic and scalable cybersecurity solution at the enterprise level. As threats continue to increase in frequency and sophistication, enterprise SOC teams will require a platform that can streamline security processes without sacrificing reliability, the report shows.


Attacks aimed at government, manufacturing and banking sectors keep rising in frequency and intensity due to their high potential for payout, Stefano De Blasi, Cyber Threat Intelligence Analyst at Digital Shadows, a San Francisco-based provider of digital risk protection solutions, explains.


“To make sense of this information, it is essential to remember that the cybercriminals’ top priority is simply to get paid at the end of an offensive operation. In particular, cybercriminals can monetize more effectively when targeted organizations hold sensitive information and/or cannot afford any downtime due to production needs. This observation is likely to have driven attacks against the sectors mentioned above for different reasons.”


De Blasi says that governments, which typically maintain highly sensitive data about their citizens and critical infrastructure, are consequently pressured to pay the requested ransom to protect those pieces of information.


“On the other hand, cybercriminals often perceive organizations in the financial sector as wealthy and are thus incentivized to target them because of the potential of a high payout. Finally, manufacturing companies can typically afford minimal downtime and would likely be pressured into paying the ransom to restart production,” he adds. “In the past 18 months, ransomware operations have become more frequent and profitable than ever. In this timeframe, a few ransomware groups managed to establish well-organized Ransomware-as-a-Service (RaaS) programs and become renowned players in the threat landscape. On the other hand, although we’ve observed dozens of smaller ransomware groups appearing on the scene, these groups often struggle to establish long-lasting operations when competing with the technical and financial resources of established RaaS programs.


“Keeping the pace of threat actors is a daunting task for every security team and can often result in a whack-a-mole game. Cybercriminals are constantly improving and updating their tactics, techniques, and procedures (TTPs) to stay one step ahead of security professionals and have now reached an impressive level of sophistication in their operations. However, security teams can increase the robustness of their defensive strategies by making themselves a difficult target. Cybercriminals are typically opportunistic, financially motivated actors who target low-hanging fruits. Therefore, by following basic cyber hygiene best practices and sticking to their threat model, security teams have more chances to adopt a proactive and agile posture that would place them in a much better position.”


In addition, ransomware attacks are increasing because companies are paying the ransom, says Timur Kovalev, chief technology officer at Untangle, a San Jose, Calif.-based provider of comprehensive network security for SMBs. 


JBS allegedly paid an $11 million ransom to cybercriminals. The CEO of Colonial Pipeline said a $4.4 million ransom payment was made. Brenntag, a company that deals with the distribution of chemical products, allegedly paid close to $7.5 million after Darkside stole more than 150 GB of information.


Cybercriminals see the large payouts, and it encourages them to strike more often, and at larger, more lucrative targets, Kovalev explains: “While ransomware attacks continue and the amounts demanded increase too, there are several defensive moves companies and governments can make to help prevent ransomware attacks in the future. First and foremost, companies should not pay the ransom. Law enforcement agencies encourage organizations not to pay fees to cybercriminals as it encourages more attacks. In addition, there should be consistent policies for international cooperation. It’s time to recognize that this is an international issue and that the most effective way to stop ransomware is by developing a global solution. Business and government leaders must work together to readily share information, develop prosecution agreements for cybercriminals and impose sanctions against rogue nations that harbor cyber pirates. Lastly, to combat attacks, large corporations that could be targeted may begin to add cryptocurrency and blockchain specialists to their security teams. Those with investigative and tracing skills may soon be in high demand for law enforcement and businesses.”


John Bambenek, Principal Threat Hunter at Netenrich, a San Jose, Calif.-based digital IT and security operations company, says, “Clearly, the cadence of attacks is not going to relax anytime soon. Organizations need to take a serious look at their attack surface to find where their points of weakness are and focus their spending on protecting those assets. Many entities are still behind the ball on making sure they are planning for resiliency for when attacks succeed.”

KEYWORDS: cyber security information security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • maritime

    Maritime Industry Sees 400% Increase in Attempted Cyberattacks Since February 2020

    See More
  • SEC0320-cyber-feat-slide1_900px.jpg

    Pharmaceutical industry sees increase in mobile phishing encounters

    See More
  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    75% Increase in Reports of Ransomware Attacks on Healthcare Entities

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • s in europe.jpg

    Surveillance in Europe

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing