Ransomware

Ransomware Spotlight: INC

October 29, 2024

INC ransomware was first detected in July 2023, but has already released new versions: one that targets Linux computers and an update on their Windows variant. The ransomware has been observed to exploit CVE-2023-3519 and uses HackTool.Win32.ProcTerminator.A for defense evasion and HackTool.PS1.VeeamCreds for credential access in its different attack chains.

Read more  

Ransomware: A type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid.   Read more
  • May 07, 2024
    The landscape of ransomware attacks in the first quarter of 2024 presents new insights and shifts in tactics among cybercriminal groups. This report shows key players, targeted sectors, and geographic distributions of attacks by ransomware groups, both notorious and relatively new.
  • May 07, 2024
    The LockBit intrusion set, tracked by Trend Micro as Water Selkie, has one of the most active ransomware operations today. With LockBit’s strong malware capabilities and affiliate program, organizations should keep abreast of its machinations to effectively spot risks and defend against attacks.
  • March 27, 2024
    We cover the key trends that defined the ransomware threat landscape in the second half of 2023. Data from RaaS and extortion groups’ leak sites, open-source intelligence (OSINT) research, and the Trend Micro telemetry shows that LockBit, BlackCat, and Clop continued to rank among the active RaaS and extortion groups with the highest victim counts during this period.
  • March 06, 2024
    Our continuous surveillance and research of the threat landscape in 2023 showed patterns suggesting that as cybercriminals take advantage of the expanding attack surface, they are also learning to prioritize substance over size.
  • December 05, 2023
    2024 is poised to be a hotbed for new challenges in cybersecurity as the economic and political terrains continue to undergo digitization and enterprises increasingly leverage artificial intelligence and machine learning (AI/ML), the cloud, and Web3 technologies. While these innovations are expected to lend a hand to organizations, they also provide opportunities for cybercriminals by promising big returns, more streamlined operations on wider impact zones, and more targeted victims.
  • November 28, 2023
    After the shutdown of its leak site in October, we look at how ransomware group Trigona operated during its period of activity and discuss how enterprises can fortify their defenses against similar threats.
  • October 05, 2023
    This report spotlights Akira, a novel ransomware family with highly experienced and skilled operators at its helm.
  • September 21, 2023
    We delve into three of the most active ransomware families that dominated the first half of 2023: LockBit, Clop, and BlackCat. This report features data from ransomware-as-a-service (RaaS) and extortion groups’ leak sites, Trend Micro’s open-source intelligence (OSINT) research, and the Trend Micro™ Smart Protection Network™, collected from Jan. 1 to June 30, 2023.
  • August 08, 2023
    In this year’s Midyear Roundup, we look at the major events in the first half of 2023 and draw a picture of the threat landscape from behaviors and patterns observed in the threat landscape to stay ahead and prepare for risks in the second half of the year.