Ticker.tv reports:
A recent report released cybersecurity service provider Sophos reveals a significant rise in remote encryption attacks conducted some of the most active ransomware groups. The study, titled “CryptoGuard: An Asymmetric Approach to the Ransomware Battle,” identifies ransomware groups including Akira, ALPHV/BlackCat, LockBit, Royal, and Black Basta as perpetrators of remote encryption attacks.
In remote encryption attacks, adversaries exploit compromised and often poorly secured endpoints to encrypt data on other devices connected to the same network. This method allows attackers to infect multiple devices at once, potentially causing widespread damage and data loss.
Sophos’ CryptoGuard, an anti-ransomware technology included in all Sophos Endpoint licenses, detected a staggering 62% year-over-year increase in intentional remote encryption attacks since 2022. This surge in attacks highlights the growing threat posed remote ransomware and the need for improved defensive measures.
Traditional anti-ransomware protection methods deployed on remote devices are ineffective against remote encryption attacks, as they fail to detect the malicious files or their activity. However, Sophos’ CryptoGuard technology takes a unique approach to combat remote ransomware. It analyzes the content of files to identify any instances of encryption, enabling the detection of ransomware activity on any device within a network, even without the presence of malware.
Read more at Ticker.tv