Discover more from ESSGroup
Subscribe to get the latest posts sent to your email.
Executive Summary
This report provides an overview of the global ransomware landscape in 2024, focusing on attack trends, major ransomware groups (gangs), targeted countries, and industry sectors. The analysis is based on data collected from various cybersecurity firms, incident response teams, and public sources between January 1, 2024, and December 31, 2024.
Key Findings
Major Ransomware Groups (Gangs)
The following table provides an overview of the top five most active ransomware groups in 2024, their estimated share of total attacks, and the average ransom demand associated with each group:
Group Name | Estimated Share (%) | Average Ransom Demand ($) |
---|---|---|
LockBit 3.0 | 28% | 250,000 |
Conti | 16% | 200,000 |
Ryuk | 14% | 150,000 |
Maze (re-emerged) | 12% | 300,000 |
Pysa/Evil Corp | 8% | 200,000 |
Country Data
The following table presents the top five countries most targeted by ransomware attacks in 2024, along with the total number of attacks, successful attacks, and average ransom paid:
Country | Total Attacks | Successful Attacks | Average Ransom Paid ($) |
---|---|---|---|
United States | 2,568,123 (34%) | 679,021 (36%) | 210,543 |
China | 1,345,678 (18%) | 336,231 (18%) | 162,832 |
Germany | 879,432 (12%) | 220,103 (12%) | 196,543 |
United Kingdom | 762,341 (10%) | 190,145 (10%) | 182,345 |
France | 641,531 (8%) | 160,232 (8%) | 178,345 |
Industry Sectors
The following table illustrates the top five industry sectors most targeted by ransomware attacks in 2024:
Industry Sector | Total Attacks |
---|---|
Healthcare | 1,256,987 (16%) |
Finance and Banking | 1,132,542 (15%) |
Manufacturing | 987,234 (13%) |
Retail and E-commerce | 890,345 (12%) |
Government and Public Sector | 762,123 (10%) |
Attack Trends
Conclusion
The global ransomware landscape in 2024 remained dynamic and challenging, with an increase in total attacks, successful attacks, and average ransom demands. Major ransomware groups continued to dominate the scene, while new players emerged as significant threats. Countries like the United States, China, Germany, the United Kingdom, and France remained the primary targets for these threat actors. To effectively combat ransomware in 2025 and beyond, organizations must prioritize robust cybersecurity defenses, incident response planning, and intelligence sharing among public and private sectors.
Sources
Subscribe to get the latest posts sent to your email.
Lorem Ipsum is simply dummy text of the printing and typesetting
industry. Lorem Ipsum has been the industry's
Threat Overview
FortiGuard Labs has published a comprehensive threat report on security incident response, providing insights and recommendations for organizations to improve their response capabilities.
Published on 2025-01-15, the report titled “PSIRT | FortiGuard Labs” highlights the importance of staying informed about emerging threats and having effective incident response strategies in place.
Short Description of Actor Group
This threat report is not associated with a specific actor group or malicious activity. Instead, it focuses on fortifying security incident response measures across organizations.
Report Details
The PSIRT | FortiGuard Labs report offers valuable insights into the following areas:
– The FortiGuard Labs service
– Effective security incident response techniques
– New research and training opportunities available online and via their app
Recommendations from the Report
Based on the findings in the report, here are some key recommendations to enhance your organization’s cybersecurity resilience:
1. Stay Informed: Keep track of emerging threats by regularly accessing resources like FortiGuard Labs.
2. Assess Current Incident Response Plan: Review and update your incident response plan to ensure its effectiveness against modern-day threats.
3. Train Your Team: Empower your team with regular training to stay up-to-date on incident response best practices.
4. Investigate New Tools and Techniques: Explore new research, tools, and techniques available online and through FortiGuard Labs’ app for improved incident response.
Resources
For more information about the PSIRT | FortiGuard Labs report, please refer to the following links:
In the ever-evolving landscape of cyber threats, staying informed about the latest campaigns and their methodologies is crucial for maintaining robust security measures. A recent threat report published by AlienVault on February 12, 2025, sheds light on a significant campaign known as REF7707. This report, titled ‘From South America to Southeast Asia: The Fragile Web of REF7707,’ provides valuable insights into the tactics, techniques, and procedures (TTPs) employed by this actor group.
The REF7707 campaign is notable for its well-engineered and highly capable intrusion set. However, despite its advanced capabilities, the campaign has been marred by poor management and inconsistent evasion practices. This discrepancy highlights a critical aspect of cybersecurity: even the most sophisticated threats can be mitigated if their execution is flawed.
The report details 399 connected elements, offering a comprehensive view of the campaign’s infrastructure and methodologies. The actor group behind REF7707 has demonstrated a novel approach to intrusion, making it essential for security operation centers (SOCs) to understand these tactics to better defend against similar threats in the future.
One of the key takeaways from this report is the importance of consistent evasion practices. While the campaign’s initial intrusion set was highly capable, the lack of consistency in evading detection allowed security teams to identify and mitigate the threat more effectively. This underscores the need for continuous monitoring and adaptive security measures that can detect and respond to evolving threats.
The report also emphasizes the global reach of the REF7707 campaign, spanning from South America to Southeast Asia. This geographical diversity indicates that no region is immune to sophisticated cyber threats, and organizations worldwide must remain vigilant. The campaign’s ability to target multiple regions highlights the need for a unified approach to cybersecurity, where information sharing and collaboration are paramount.
For SOCs, this report serves as a reminder of the importance of threat intelligence. By staying informed about the latest campaigns and their TTPs, security teams can proactively defend against potential threats. The report provides valuable insights into the REF7707 campaign’s infrastructure, allowing SOCs to identify similar patterns in future attacks.
In addition to understanding the threat landscape, SOCs must also focus on improving their evasion detection capabilities. Consistent and effective evasion practices are crucial for maintaining a strong security posture. By analyzing the flaws in the REF7707 campaign’s execution, SOCs can enhance their own strategies to better detect and mitigate similar threats.
The report is highly reliable, with a confidence level of 100% and a reliability rating of A – Completely reliable. This ensures that the information provided is accurate and trustworthy, making it an invaluable resource for security professionals.
For further reading, the report includes external references to additional resources:
– https://www.elastic.co/security-labs/fragile-web-ref7707
– https://otx.alienvault.com/pulse/67ad1528608f24b71bcea41b
These links provide more detailed information on the REF7707 campaign and its implications for cybersecurity.
In conclusion, the ‘From South America to Southeast Asia: The Fragile Web of REF7707’ report offers a comprehensive analysis of a sophisticated yet flawed cyber threat. By understanding the TTPs employed by this actor group and learning from their mistakes, SOCs can enhance their security measures and better protect against future threats.
Recommendations for Mitigation:
1. Enhance Threat Intelligence: Stay updated with the latest threat reports and intelligence to understand emerging threats and their TTPs.
2. Improve Evasion Detection: Implement robust evasion detection mechanisms to identify and mitigate sophisticated threats effectively.
3. Foster Collaboration: Encourage information sharing and collaboration within the cybersecurity community to build a unified defense against global threats.
4. Continuous Monitoring: Maintain continuous monitoring of network activities to detect and respond to potential threats promptly.
5. Adaptive Security Measures: Develop adaptive security measures that can evolve with changing threat landscapes.
By following these recommendations, SOCs can strengthen their defenses and better protect against the ever-evolving cyber threats.
Cybersecurity researchers are raising alarms about ongoing exploitation attempts targeting a recently disclosed vulnerability in Synacor’s Zimbra Collaboration platform.
According to enterprise security firm Proofpoint, exploitation activity started on September 28, 2024. Attackers are aiming to exploit CVE-2024-45519, a critical flaw in Zimbra’s postjournal service that allows unauthenticated attackers to execute arbitrary commands on vulnerable systems.
“The spoofed emails, posing as Gmail, were sent to fake addresses in the CC fields to trick Zimbra servers into parsing and executing them as commands,” Proofpoint shared in a series of posts on X. The spoofed addresses included Base64-encoded strings that Zimbra executed with the sh
utility.
The flaw was patched by Zimbra in versions 8.8.15 Patch 46, 9.0.0 Patch 41, 10.0.9, and 10.1.1, released on September 4, 2024, thanks to the discovery by security researcher lebr0nli (Alan Li).
Although the postjournal service may not be enabled on all systems, Ashish Kataria, a security engineer at Synacor, emphasized the importance of applying the patch to prevent potential exploitation. As a temporary measure for systems without the patch, removing the postjournal binary could be considered.
Proofpoint also revealed that the CC’d addresses, once decoded, attempt to plant a web shell at /jetty/webapps/zimbraAdmin/public/jsp/zimbraConfig.jsp
, allowing command execution or file downloads over a socket connection.
The exploitation began after Project Discovery published technical details, revealing that the vulnerability stems from unsanitized user input being passed to popen
, allowing attackers to inject commands.
In light of these active attacks, it’s critical for Zimbra users to apply the latest patches immediately to safeguard against these threats.
Subscribe now to keep reading and get access to the full archive.