New Rapid7 research analyses more than 70 active ransomware groups, 21 of which were new in 2024
Rapid7, a leader in extended risk and threat detection, has announced the release of its Ransomware Radar Report in conjunction with the company’s presence at Black Hat USA.
The all-new research report provides a fresh perspective on the global ransomware threat by analysing, comparing and contrasting attacker activity and techniques over 18 months ending June 30, 2024.
According to the report, ransomware groups continue to refine their craft, building and scaling business models that resemble legitimate corporate enterprises. They market their services to prospective buyers, offer company insiders commissions in exchange for access and run formal bug bounty programs.
In addition, Rapid7 researchers found three major clusters of ransomware families with similar source code, indicating that ransomware groups are focusing their development efforts on quality over quantity.
“The Ransomware Radar Report uses data to tell the story of how ransomware and the threat actors that wield it are evolving,” said Christiaan Beek, Senior Director, Threat Analytics at Rapid7. “For example, the related source code, combined with a continuing decline in the number of unique ransomware families, suggests a move toward more specialised and highly effective ransomware variants, rather than a broad array of less sophisticated malware.”
Additional key findings from the Ransomware Radar Report include:
- 21 new groups have surfaced: Within the first six months of 2024, Rapid7 observed 21 new ransomware groups entering the scene. Some of these groups are brand new while others are previously known groups rebranding under a new name. One of the most notable of these new groups, RansomHub, has quickly established itself as a prominent extortion group by making 181 posts to its leak site between February 10 and June 30, 2024
- Leak site posts are up 23%: Each leak site post represents an extortion attempt. The number of ransomware groups actively posting to leak sites is increasing, from an average of 24 groups posting per month in the first half (H1) of 2023 to 40 per month in H1 2024. Furthermore, 68 ransomware groups made a total of 2,611 leak site posts between January and June, representing a 23% increase in the number of posts made in H1 2023
- Smaller organisations have become a more frequent target: In examining the revenue distribution of companies listed within access broker postings, Rapid7 noted that companies with annual revenues of around US$5 million are falling victim to ransomware twice as often as those in the US$30-50 million range and 5x more frequently than those with a US$100 million revenue. This finding could suggest that such companies are large enough to hold valuable data but not as well protected as their larger counterparts
“The report’s insights into the ransomware landscape are crucial for informing defenders’ cybersecurity strategies,” said Beek. “From our own detection engineering point of view, the clusters and additional report information, such as the usage and type of encryption algorithms, help us uplevel hunting techniques and prevention, detection and response technologies. Rapid7 continually investigates new techniques used by threat actors and ransomware operators, tests them against our patented Ransomware Prevention technology, and creates new preventions to ensure customers are protected against the latest threats.”