In its latest ransomware report, Ransomware Groups Don't Die, They Multiply, published on April 30, the cyber insurance firm found that ransomware activity increased by 21% in the first quarter of 2024 compared to the same period in 2023.
Key takeaways:
⚪️ Q1 2024 became the most active first quarter ever recorded — a 21% increase over Q1 2023
⚪️ Medical specialists experienced the highest concentration of attacks with a 38% increase from Q4 2023
⚪️ 18 new leak sites emerged throughout Q1 (higher than any other quarter)
Fake emails trying to get you to click on harmful links or share personal info.
Think of a fisherman casting a wide net, hoping to catch something.
Scammers send text messages trying to make you share info or click harmful links.
Phishing via voice calls. Someone might call you pretending to be from your bank and ask for sensitive details.
Big game phishing. Targeting high-profile individuals, like CEOs, with crafted scams.
Unsolicited emails usually sent in bulk.
They’re like those annoying flyers you get in your mailbox.
Unsolicited instant messages.
Imagine getting unwanted ads or links in your messaging apps.
Targeted phishing. Instead of a wide net, the attacker has a specific target in mind and crafts a custom message for them.
Literally going through trash to find discarded information like old bills or documents.
Sneaking a peek over someone’s shoulder to see their screen or watch them enter a password.
Redirecting users from legit websites to malicious ones, often without the user realizing it.
Following someone closely to gain unauthorized access to a restricted area.
Manipulating someone into revealing confidential information through casual conversation.
Adding a fake sender’s name to an email address in hopes that a recipient recognizes the name and thinks the email is safe. is safe.
Creating a fabricated scenario to obtain information from someone.
Using someone else’s personal information for malicious or fraudulent activities.
Pretending to be someone else to gain trust or information.
Sending fake invoices hoping companies pay them without noticing.
Collecting usernames and passwords, often through fake login pages.
The act of gathering preliminary data or intelligence on a target. Think of it as a thief “casing the joint” before a robbery.
A false threat or piece of information meant to deceive or scare individuals.
Efforts to change or manipulate people’s opinions or behaviors.
Compromising a website or platform that a group of people often visit, to target them.
Registering domains that are misspellings of popular ones, hoping users make a typo and visit the malicious site.
Combining traditional warfare with cyberattacks, disinformation campaigns, and other non-traditional tactics.
People tend to obey figures of authority.
Using threats or fear to get someone to comply.
If many people do it, others will likely follow.
People want things they believe are in limited supply.
We’re more likely to trust or comply with something or someone familiar.
If we trust someone, we’re more likely to do what they say.
Creating a sense of urgency makes people act quickly, often without thinking.
Copyright © 2024 Nina Novruzova - All Rights Reserved.