North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

î „Ravie Lakshmanan

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process.

“In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread malware via ‘job interview lures,” Silent Push said in a deep-dive analysis.

The activity, the cybersecurity company said, is being used to distribute three different known malware families, BeaverTail, InvisibleFerret, and OtterCookie.

Contagious Interview is one of the several job-themed social engineering campaigns orchestrated by North Korea to entice targets into downloading cross-platform malware under the pretext of coding assignment or fixing an issue with their browser when turning on camera during a video assessment.

The activity is tracked by the broader cybersecurity community under the monikers CL-STA-0240, DeceptiveDevelopment, DEV#POPPER, Famous Chollima, UNC5342, and Void Dokkaebi.

The use of front companies for malware propagation, complemented by setting up fraudulent accounts on Facebook, LinkedIn, Pinterest, X, Medium, GitHub, and GitLab, marks a new escalation for the threat actors, who have been observed using various job boards to lure victims.

“The BlockNovas front company has 14 people allegedly working for them, however many of the employee personas […] appear to be fake,” Silent Push said. “When viewing the ‘About Us’ page of blocknovas[.]com via the Wayback Machine, the group claimed to have been operating for ’12+ years’ – which is 11 years longer than the business has been registered.”

The attacks lead to the deployment of a JavaScript stealer and loader called BeaverTail, which is then used to drop a Python backdoor referred to as InvisibleFerret that can establish persistence on Windows, Linux, and macOS hosts. Select infection chains have also been found to serve another malware codenamed OtterCookie via the same JavaScript payload used to launch BeaverTail.

BlockNovas has been observed using video assessments to distribute FROSTYFERRET and GolangGhost using ClickFix-related lures, a tactic that was detailed earlier this month by Sekoia, which is tracking the activity under the name ClickFake Interview.

BeaverTail is configured to contact an external server (“lianxinxiao[.]com”) for command-and-control (C2) to serve InvisibleFerret as the follow-up payload. It comes with various features to harvest system information, launch a reverse shell, download additional modules to steal browser data, files, and initiate the installation of the AnyDesk remote access software.

Further analysis of the malicious infrastructure has revealed the presence of a “Status Dashboard” hosted on one of BlockNovas’ subdomains to maintain visibility into four of their domains: lianxinxiao[.]com, angeloperonline[.]online, and softglide[.]co.

A separate subdomain, mail.blocknovas[.]com domain, has also been found to be hosting an open-source, distributed password cracking management system called Hashtopolis. The fake recruitment drives have led to at least one developer getting their MetaMask wallet allegedly compromised in September 2024.

That’s not all. The threat actors also appear to be hosting a tool named Kryptoneer on the domain attisscmo[.]com that offers the ability to connect to cryptocurrency wallets such as Suiet Wallet, Ethos Wallet, and Sui Wallet.

“It’s possible that North Korean threat actors have made additional efforts to target the Sui blockchain, or this domain may be used within job application processes as an example of the ‘crypto project’ being worked on,” Silent Push said.

BlockNovas, according to an independent report published by Trend Micro, also advertised in December 2024 an open position for a senior software engineer on LinkedIn, specifically targeting Ukrainian IT professionals.

As of April 23, 2025, the BlockNovas domain has been seized by the U.S. Federal Bureau of Investigation (FBI) as part of a law enforcement action against North Korean cyber actors for using it to “deceive individuals with fake job postings and distribute malware.”

Besides using services like Astrill VPN and residential proxies to obfuscate their infrastructure and activities, a noteworthy aspect of the malicious activity is the use of artificial intelligence (AI)-powered tools like Remaker to create profile pictures.

The cybersecurity company, in its analysis of the Contagious Interview campaign, said it identified five Russian IP ranges that have been used to carry out the operation. These IP addresses are obscured by a VPN layer, a proxy layer, or an RDP layer.

“The Russian IP address ranges, which are concealed by a large anonymization network that uses commercial VPN services, proxy servers, and numerous VPS servers with RDP, are assigned to two companies in Khasan and Khabarovsk,” security researchers Feike Hacquebord and Stephen Hilt said.

“Khasan is a mile from the North Korea-Russia border, and Khabarovsk is known for its economic and cultural ties with North Korea.”

If Contagious Interview is one side of the coin, the other is the fraudulent IT worker threat known as Wagemole, which refers to a tactic that involves crafting fake personas using AI to get their IT workers hired remotely as employees at major companies.

These efforts have dual motivations, designed to steal sensitive data and pursue financial gain by funneling a chunk of the monthly salaries back to the Democratic People’s Republic of Korea (DPRK).

“Facilitators are now using GenAI-based tools to optimize every step in the process of applying and interviewing for roles and to aid DPRK nationals attempting to maintain this employment,” Okta said.

“These GenAI-enhanced services are required to manage the scheduling of job interviews with multiple DPRK candidate personas by a small cadre of facilitators. These services use GenAI in everything from tools that transcribe or summarize conversations, to real-time translation of voice and text.”

Telemetry data gathered by Trend Micro points to the Pyongyang-aligned threat actors working from China, Russia, and Pakistan, while using the Russian IP ranges to connect to dozens of VPS servers over RDP and then perform tasks like interacting on job recruitment sites and accessing cryptocurrency-related services.

“Given that a significant portion of the deeper layers of the North Korean actors’ anonymization network is in Russia, it is plausible, with low to medium confidence, that some form of intentional cooperation or infrastructure sharing exists between North Korea and Russian entities,” the company said.

read more

Don’t just lock your door: MFA alone is not enough in today’s cybersecurity climate

Story by Jon Jarvis

The cybersecurity landscape is evolving with serious pace, and organizations are facing increasingly sophisticated threats from attackers who are constantly finding new ways to bypass traditional defenses.

For years, Multi-Factor Authentication (MFA) has been heralded as a cornerstone of modern security practices, providing an additional layer of protection beyond passwords. However, as threat actors sharpen their tools and exploit vulnerabilities, it has become clear that MFA alone is no longer sufficient to safeguard sensitive information.

<cs-card “=”” class=”card-outer card-full-size ” card-fill-color=”#565656″ card-secondary-color=”#272727″ gradient-angle=”112.05deg” id=”native_ad_inarticle-1-5c32856b-7ad4-48de-b397-b175ccdaf0e8″ size=”_2x_1y” part=””>

To truly protect against today’s advanced threats, organizations must embrace a layered security approach that goes far beyond MFA.

The limitations of multi-factor authentication

The concept of MFA is simple yet effective: requiring multiple forms of verification—such as a password and a one-time code sent to a mobile device—adds an extra layer of security. It could be seen as locking your door with two different locks instead of just one. This has been especially valuable in combating password-based attacks, as it makes it significantly harder for attackers to gain access with stolen credentials. Yet, despite its strengths, MFA is far from infallible.

Sophisticated attackers have developed numerous methods to bypass MFA protections. Phishing remains one of the most common tactics, where users are tricked into revealing their MFA credentials on fake websites or through deceptive communications.

Related video: Cyber security expert’s tips to keep phones safe (ITN)

Man-in-the-middle attacks intercept session tokens during transmission, rendering MFA useless in certain scenarios. MFA fatigue attacks—where users are inundated with repeated authentication requests until they approve one out of frustration or confusion—are becoming alarmingly frequent.

SIM swapping allows attackers to hijack phone numbers used for SMS-based authentication, while session hijacking enables them to bypass MFA altogether by stealing authenticated tokens. These techniques demonstrate that while MFA is necessary, it is insufficient as a standalone solution.

The rise of AI-driven cyberattacks and the proliferation of SaaS applications further complicate the picture. As businesses increasingly rely on interconnected systems and cloud-based platforms, managing identities—both human and non-human—has become more challenging than ever. Attackers exploit these complexities to target vulnerabilities in identity management systems, leading to a surge in identity-driven breaches.

<cs-card “=”” class=”card-outer card-full-size ” card-fill-color=”#565656″ card-secondary-color=”#272727″ gradient-angle=”112.05deg” id=”native_ad_inarticle-2-3e2ef4de-4221-4747-b7c0-b359d46a3710″ size=”_2x_1y” part=””>

The need for a layered security approach

To address these challenges, organizations must adopt a layered security strategy that incorporates multiple defenses working together to protect against threats. This approach, often referred to as “defense in depth,” recognizes that no single security measure can provide complete protection. Instead, overlapping layers create redundancies that ensure if one layer fails, others remain effective.

A foundational element of this strategy is the implementation of zero trust architecture. Zero trust operates on the principle of “never trust, always verify,” meaning that every user and device must be continuously authenticated and authorized before accessing sensitive resources. Unlike traditional perimeter-based security models—which assume that everything inside the network is safe—zero trust assumes that threats can exist anywhere and requires constant vigilance.

<cs-card “=”” class=”card-outer card-full-size ” card-fill-color=”#565656″ card-secondary-color=”#272727″ gradient-angle=”112.05deg” id=”native_ad_inarticle-3-5af6de0b-81db-40c5-8d65-c5a2d4ec6314″ size=”_2x_1y” part=””>

Zero trust builds upon MFA by incorporating additional checks and balances into the authentication process. For example, adaptive authentication uses AI and machine learning to assess risk factors such as user behavior, device type, location, and login patterns before granting access. Biometric authentication methods like fingerprint scanning or facial recognition add another layer of security while improving user experience by eliminating reliance on passwords or codes.

Enhancing endpoint protection

Endpoint protection is another critical component of a layered security strategy. Devices such as laptops, smartphones, and tablets are often the first line of defense against attacks—and also the most vulnerable entry points for attackers seeking access to an organization’s network. Advanced Endpoint Detection & Response can detect and prevent malware infections, unauthorized access attempts, and other threats targeting devices.

Implementing robust endpoint security measures involves not only deploying software solutions but also ensuring that devices are regularly updated and patched. This includes maintaining strong identity and access management (IAM) practices to ensure that only authorized users can access sensitive data from these devices.

Network segmentation and monitoring

Network segmentation further enhances security by dividing an organization’s network into smaller segments or zones based on sensitivity levels. This limits the spread of potential breaches and ensures that attackers cannot move laterally across the entire network even if attackers gain access to one segment.

Comprehensive monitoring and detection systems play a vital role in identifying and responding to threats in real time. Centralized monitoring solutions can analyze vast amounts of data from across the organization’s infrastructure to detect anomalies or suspicious activity. When combined with automated response mechanisms, these systems enable rapid remediation before threats escalate into full-blown breaches.

The future of cybersecurity

The future of cybersecurity lies in embracing a holistic approach that combines technology with proactive strategies. Organizations must invest not only in advanced tools but also in employee training programs to raise awareness about phishing attacks and other social engineering tactics. Security policies should be regularly updated to reflect emerging threats and technological advancements.

It’s clear that the cybersecurity landscape will continue to evolve at breakneck speed. Threat actors are becoming more sophisticated by leveraging AI-driven techniques and exploiting gaps in traditional defenses like MFA. Organizations must remain agile and adaptable—constantly reassessing their security strategies—to stay ahead of these evolving threats.

While MFA remains an important piece of the puzzle, it is no longer enough on its own. A robust layered security approach ensures that if one defense fails, others remain effective in protecting sensitive information from compromise.

The days when locking your door once or twice was enough are long gone; today’s threat landscape demands multiple layers of protection working together seamlessly. Only by embracing this mindset can organizations hope to safeguard their assets in an increasingly interconnected digital world where attackers are always one step ahead—and where cybersecurity must evolve just as rapidly as the threats it seeks to counteract.

We’ve featured the best privacy tool and anonymous browser.

read more

The growing threat of device code phishing and how to defend against It

Story by Mike Britton

Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses.

The latest method causing trouble for security teams is that of device code phishing, a technique that tricks users into granting access to sensitive accounts without attackers needing to steal a password.

Microsoft recently issued a warning about a particular device code phishing campaign being conducted by Storm-2372, where a supposed Russian-backed threat actor was wreaking havoc by hijacking user sessions through legitimate authentication flows. These attacks are trickier to detect than usual given that they exploit real login pages (rather than the spoofed versions that traditional phishing techniques relied on) and are capable of bypassing multi-factor authentication (MFA).

The recent warning from Microsoft will most likely be the first of many. Various other platforms follow the same style of authentication flows and attackers will most likely replicate the technique elsewhere. It is down to security teams once again to identify the warning signs of this new breed of phishing, and implement the best cybersecurity practices to get ahead of the curve.

Related video: Cyber security expert’s tips to keep phones safe (ITN)

Understanding device code phishing

Unlike traditional credential phishing attacks, device code phishing is unique in that there is no need to directly steal a password. Instead, attackers manipulate victims into handing over access to their accounts by exploiting authentication methods designed to make logging in easier.

They start the same way as most email attacks do: through social engineering. By impersonating a trusted colleague or IT administrator, the attackers send an email invitation to an online meeting (often a Microsoft Teams meeting) that looks legitimate. The email is designed to appear normal – for instance, it might look like a genuine Teams meeting invite.

When the victim clicks the link in the fake invite, they are prompted to log in using a special code (the “device code”), which is provided by the attacker. And because the website they land on is a real Microsoft login page, the user doesn’t suspect anything phishy.

What makes this technique especially dangerous is that it exploits legitimate authentication systems without creating counterfeit ones. This removes the need for attackers to steal passwords. Instead, they can gain access by capturing session tokens which allow them to operate without triggering additional authentication prompts. And because the tokens are already verified, attackers can often bypass MFA.

At first glance, nothing seems unusual. Suspicion is reduced due to the official Microsoft website, and therefore, victims won’t hesitate to enter a device code to authenticate the session. However, instead of linking their own device, they are unknowingly authorizing the attacker’s session. Once access is granted, the attacker has the keys to the kingdom and is free to operate within the victim’s account, access sensitive information, and launch lateral attacks.

How users can recognize and avoid these attacks

Device code phishing has created a minefield where legitimate tools are utilized for malicious purposes. Organizations must be proactive in recognizing these attacks and be sure to have effective authentication security measures in place.

Users should always treat unexpected meeting invites with suspicion, especially if they contain login prompts that require immediate action. Before entering any device code, users should verify the legitimacy of the request through a separate communication channel, such as a direct phone call or an internal messaging platform. If a login request appears out of the blue, it’s always best to avoid proceeding until its authenticity is confirmed.

Device codes are particularly impactful as they are designed to be entered on trusted devices. As a result, users should never share a login code with another person or enter a code they receive via email or chat unless they personally initiated the request. Legitimate services will never email a device code and then ask a user to input it on a separate website. If workforces can get to grips with this fundamental security principle, it can prevent many device code phishing attempts from succeeding.

Organizational steps to mitigate risk

Protecting against these attacks can’t rely solely on the user and organizations must take steps to reduce the risk of device code phishing.

One of the most effective measures is to disable any unnecessary device code authentication flows. If it isn’t essential for business operations, then it should be removed to eliminate a significant attack vector. Security teams should regularly review authentication policies and restrict device code logins to only trusted devices.

Conditional access policies go one step further, as they can restrict authentication attempts based on user behavior, device type, geographic location, and risk level. If a login attempt occurs from an unfamiliar location or outside of approved business hours, access can be blocked or require additional verification.

This is why it’s key to embrace behavioral AI measures which can establish baseline “normal” behaviors within an organization’s IT environment, and in turn question anything that seems out of the ordinary. Behavioral AI systems analyze characteristics like login patterns to detect anomalies, such as multiple authentication attempts from different locations or unusual device code submissions. By comparing these activities to known-good user behaviors, deviations from the norm can be flagged as suspicious.

And since device code phishing hinges on meeting invites to spread the attack, these should also be monitored. Security teams should regularly audit and flag unusual meeting request patterns, particularly those originating from compromised accounts.

Lastly, security awareness programs should be an ongoing feature of any cybersecurity strategy. Cyber threats evolve constantly, so training should also be continuous. Employees must be trained to recognize the warning signs of device code phishing and understand the risks of entering authentication codes without verification. Creating a culture where security is front of mind when handling unexpected requests is vital.

The time to act is now

As this latest technique continues to prove effective, cybercriminals will no doubt expand their use of device code phishing. Organizations must act now to defend against this emerging threat. A combination of user awareness and strong security policies which are strengthened by advanced threat detection can help organizations to stay ahead.

The sooner organizations implement these measures, the sooner they can reduce their exposure to device code phishing and protect their employees, data, and systems from this growing cyber threat.

We’ve listed the best identity management software.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

read more

Top 10 Cyber Attacks of 2024

By

Guru Baran

The year 2024 witnessed a surge in cyber-attacks, with incidents targeting critical infrastructure, healthcare, financial institutions, and even political campaigns.

These attacks highlight the growing sophistication of threat actors and the vulnerabilities across industries. Below is a detailed list of the top 10 cyber-attacks of 2024 based on their scale, impact, and geopolitical significance.

  • Healthcare Under Siege: Ransomware gangs increasingly targeted healthcare due to its critical nature.
  • Geopolitical Espionage: State-sponsored groups from China and Russia intensified attacks on critical infrastructure and political entities.
  • Supply Chain Vulnerabilities: Attacks like XZ Utils underscored the risks inherent in software supply chains.
  • AI Weaponization: Threat actors began leveraging generative AI tools for both offensive operations and malware development.

Table of Contents

  1. Change Healthcare Ransomware Attack
  2. Snowflake Data Breach
  3. Chinese Espionage Campaigns: Salt Typhoon and Volt Typhoon
  4. XZ Utils Supply Chain Attack
  5. National Public Data Breach
  6. CrowdStrike Falcon Update Outage
  7. Internet Archive Attack
  8. OpenAI’s Generative AI Exploitation Attempts
  9. Dell Data Breach
  10. Midnight Blizzard Targets Microsoft Executives

1. Change Healthcare Ransomware Attack

In February 2024, the Alphv/BlackCat ransomware group targeted Change Healthcare, a subsidiary of UnitedHealth Group. This attack disrupted healthcare services nationwide, affecting hospitals’ ability to process payments, prescribe medications, and perform procedures.

Over 100 million individuals had sensitive medical data exposed, making it one of the largest healthcare breaches in history. The company reportedly paid $22 million in ransom to recover operations.

2. Snowflake Data Breach

A widespread breach in April 2024 compromised accounts stored on Snowflake’s cloud platform due to inadequate security measures like missing multifactor authentication (MFA).

High-profile victims included AT&T (70 million customers affected), Ticketmaster (560 million records stolen), and Santander Bank. The attackers, linked to the Scattered Spider group, stole terabytes of sensitive data and extorted millions from corporations.

3. Chinese Espionage Campaigns: Salt Typhoon and Volt Typhoon

Chinese state-sponsored groups launched two major campaigns in 2024:

  • Volt Typhoon infiltrated U.S. critical infrastructure networks to prepare for potential disruptions during geopolitical conflicts.
  • Salt Typhoon targeted U.S. telecom providers like AT&T and Verizon, stealing metadata and compromising communications of political figures such as Donald Trump and JD Vance. These campaigns showcased China’s strategic use of cyber-espionage to gain geopolitical leverage.

4. XZ Utils Supply Chain Attack

The XZ Utils backdoor attack (CVE-2024-3094), disclosed in March 2024, was a near-miss supply chain compromise that could have caused catastrophic damage.

The attackers embedded malicious code into a widely used compression utility, potentially impacting thousands of downstream systems globally before it was detected and mitigated.

5. National Public Data Breach

In April 2024, hackers breached National Public Data’s systems, exposing 2.9 billion records containing personal information such as Social Security numbers and phone numbers.

The data was sold on the dark web for $3.5 million. This breach highlighted the risks posed by data brokers collecting and monetizing personal information without robust security measures.

6. CrowdStrike Falcon Update Outage

A faulty software update for CrowdStrike’s Falcon platform in July caused a global IT outage affecting approximately 8.5 million devices. Critical sectors like airlines and hospitals faced significant disruptions, resulting in an estimated $5.4 billion in damages for Fortune 500 companies alone.

7. Internet Archive Attack

In September 2024, attackers breached the Internet Archive’s systems, exposing over 31 million files, including email addresses and usernames. The attack also involved distributed denial-of-service (DDoS) incidents by pro-Palestinian hackers targeting the U.S.-based non-profit organization.

8. OpenAI’s Generative AI Exploitation Attempts

OpenAI reported thwarting over 20 attempts by state-sponsored groups from Russia, China, and Iran to exploit its large language models (LLMs) for malicious purposes. These included spear-phishing campaigns, infrastructure reconnaissance, and malware development using AI tools like ChatGPT.

9. Dell Data Breach

In May 2024, Dell Technologies disclosed a breach affecting 49 million customer records containing names, addresses, and order details. Although financial data was not exposed, attackers attempted to sell the stolen database online for $500,000.

10. Midnight Blizzard Targets Microsoft Executives

Russian threat group Midnight Blizzard (APT29) infiltrated Microsoft’s corporate email accounts starting in late 2023 but was discovered in January 2024. The group accessed sensitive information from senior executives in cybersecurity and legal departments as part of a broader espionage campaign targeting private companies.

As cyber threats grow more sophisticated each year, organizations must prioritize robust cybersecurity measures like MFA implementation, regular vulnerability assessments, and employee training to mitigate risks effectively.

read more

Tech Ransomware is 35 years old and now a billion-dollar problem. Here’s how it could evolve

thumbnail

Key Points
  • Dating back to the 1980s, ransomware is a form of malware used by cybercriminals to lock files on a person’s computer and demand payment to unlock them.
  • The technology — which officially turned 35 in December — has come a long way, with criminals now able to spin up ransomware much faster and deploy it across multiple targets.
  • Experts expect ransomware to evolve even further, with modern-day cloud computing tech, artificial intelligence and geopolitics shaping its future.
As the ransomware industry evolves, experts are predicting hackers will only continue to find more and more ways of using the technology to exploit businesses and individuals.
As the ransomware industry evolves, experts are predicting hackers will only continue to find more and more ways of using the technology to exploit businesses and individuals.
Seksan Mongkhonkhamsao | Moment | Getty Images

Ransomware is now a billion-dollar industry. But it wasn’t always that large — nor was it a prevalent cybersecurity risk like it is today.

Dating back to the 1980s, ransomware is a form of malware used by cybercriminals to lock files on a person’s computer and demand payment to unlock them.

The technology — which officially turned 35 on Dec. 12 — has come a long way, with criminals now able to spin up ransomware much faster and deploy it across multiple targets.

Cybercriminals raked in $1 billion of extorted cryptocurrency payments from ransomware victims in 2023 — a record high, according to data from blockchain analysis firm Chainalysis.

Experts expect ransomware to continue evolving, with modern-day cloud computing tech, artificial intelligence and geopolitics shaping the future.

How did ransomware come about?

The first event considered to be a ransomware attack happened in 1989.

A hacker physically mailed floppy disks claiming to contain software that could help determine whether someone was at risk of developing AIDs.

However, when installed, the software would hide directories and encrypt file names on people’s computers after they’d rebooted 90 times.

It would then display a ransom note requesting a cashier’s check to be sent to an address in Panama for a license to restore the files and directories.

The program became known by the cybersecurity community as the “AIDs Trojan.”

“It was the first ransomware and it came from someone’s imagination. It wasn’t something that they’d read about or that had been researched,” Martin Lee, EMEA lead for Talos, the cyber threat intelligence division of IT equipment giant Cisco, told CNBC in an interview.

“Prior to that, it was just never discussed. There wasn’t even the theoretical concept of ransomware.”

The perpetrator, a Harvard-taught biologist named Joseph Popp, was caught and arrested. However, after displaying erratic behavior, he was found unfit to stand trial and returned to the United States.

How ransomware has developed

Since the AIDs Trojan emerged, ransomware has evolved a great deal. In 2004, a threat actor targeted Russian citizens with a criminal ransomware program known today as “GPCode.”

The program was delivered to people via email — an attack method today commonly known as “phishing.” Users, tempted with the promise of an attractive career offer, would download an attachment which contained malware disguising itself as a job application form.

Once opened, the attachment downloaded and installed malware on the victim’s computer, scanning the file system and encrypting files and demanding payment via wire transfer.

Then, in the early 2010s, ransomware hackers turned to crypto as a method of payment.

Ransomware attacks could get worse next year, says TrustedSec's David Kennedy

VIDEO04:39
Ransomware attacks could get worse next year, says TrustedSec’s David Kennedy

In 2013, only a few years after the creation of bitcoin, the CryptoLocker ransomware emerged.

Hackers targeting people with this program demanded payment in either bitcoin or prepaid cash vouchers — but it was an early example of how crypto became the currency of choice for ransomware attackers.

Later, more prominent examples of ransomware attacks that selected crypto as the ransom payment method of choice included the likes of WannaCry and Petya.

“Cryptocurrencies provide many advantages for the bad guys, precisely because it is a way of transferring value and money outside of the regulated banking system in a way that is anonymous and immutable,” Lee told CNBC. “If somebody’s paid you, that payment can’t be rolled back.”

CryptoLocker also became notorious in the cybersecurity community as one of the earliest examples of a “ransomware-as-a-service” operation — that is, a ransomware service sold by developers to more novice hackers for a fee to allow them to carry out attacks.

“In the early 2010s, we have this increase in professionalization,” Lee said, adding that the gang behind CryptoLocker were “very successful in operating the crime.”

What’s next for ransomware?

As the ransomware industry evolves even further, experts are predicting hackers will only continue to find more and more ways of using the technology to exploit businesses and individuals.

By 2031, ransomware is predicted to cost victims a combined $265 billion annually, according to a report from Cybersecurity Ventures.

'Fully acceptable' now that you have to use AI in your cyber defense, Darktrace's Mike Beck says

VIDEO03:48
‘Fully acceptable’ now that you have to use AI in your cyberdefense: Darktrace

Some experts worry AI has lowered the barrier to entry for criminals looking to create and use ransomware. Generative AI tools like OpenAI’s ChatGPT allow everyday internet users to insert text-based queries and requests and get sophisticated, humanlike answers in response — and many programmers are even using it to help them write code.

Mike Beck, chief information security officer of Darktrace, told CNBC’s “Squawk Box Europe” there’s a “huge opportunity” for AI — both in arming the cybercriminals and improving productivity and operations within cybersecurity companies.

“We have to arm ourselves with the same tools that the bad guys are using,” Beck said. “The bad guys are going to be using the same tooling that is being used alongside all that kind of change today.”

But Lee doesn’t think AI poses as severe a ransomware risk as many would think.

“There’s a lot of hypothesis about AI being very good for social engineering,” Lee told CNBC. “However, when you look at the attacks that are out there and clearly working, it tends to be the simplest ones that are so successful.”

Targeting cloud systems

A serious threat to watch out for in future could be hackers targeting cloud systems, which enable businesses to store data and host websites and apps remotely from far-flung data centers.

“We haven’t seen an awful lot of ransomware hitting cloud systems, and I think that’s likely to be the future as it progresses,” Lee said.

We could eventually see ransomware attacks that encrypt cloud assets or withhold access to them by changing credentials or using identity-based attacks to deny users access, according to Lee.

Geopolitics is also expected to play a key role in the way ransomware evolves in the years to come.

“Over the last 10 years, the distinction between criminal ransomware and nation-state attacks is becoming increasingly blurred, and ransomware is becoming a geopolitical weapon that can be used as a tool of geopolitics to disrupt organizations in countries perceived as hostile,” Lee said.

“I think we’re probably going to see more of that,” he added. “It’s fascinating to see how the criminal world could be co-opted by a nation state to do its bidding.”

Another risk Lee sees gaining traction is autonomously distributed ransomware.

“There is still scope for there to be more ransomwares out there that spread autonomously — perhaps not hitting everything in their path but limiting themselves to a specific domain or a specific organization,” he told CNBC.

Lee also expects ransomware-as-a-service to expand rapidly.

“I think we will increasingly see the ransomware ecosystem becoming increasingly professionalized, moving almost exclusively towards that ransomware-as-a-service model,” he said.

But even as the ways criminals use ransomware are set to evolve, the actual makeup of the technology isn’t expected to change too drastically in the coming years.

“Outside of RaaS providers and those leveraging stolen or procured toolchains, credentials and system access have proven to be effective,” Jake King, security lead at internet search firm Elastic, told CNBC.

“Until further roadblocks appear for adversaries, we will likely continue to observe the same patterns.”

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
Verified by MonsterInsights