Close Menu
Alan C. Moore
    What's Hot

    ‘No Gods or Kings’: Musk posts cryptic message — Here’s the video game that inspired it

    June 16, 2025

    Watch: Iran launches fresh strikes on Israel; missiles seen streaking across Jerusalem skies

    June 16, 2025

    Who is Vance Boelter? Suspect arrested in Minnesota lawmaker shooting; What we know

    June 16, 2025
    Facebook X (Twitter) Instagram
    Trending
    • ‘No Gods or Kings’: Musk posts cryptic message — Here’s the video game that inspired it
    • Watch: Iran launches fresh strikes on Israel; missiles seen streaking across Jerusalem skies
    • Who is Vance Boelter? Suspect arrested in Minnesota lawmaker shooting; What we know
    • THEY GOT HIM: Minnesota Shooter Vance Boelter Apprehended
    • In Today’s Modern World, Pakistan Has a Sub-Conventional Army
    • NYC Mayoral Polls: Eric Adams seeks re-election as early voting begins— Full list of contenders
    • EU chief pushes for diplomatic solution to Israel-Iran crisis in call with Netanyahu
    • NYC Primary Elections 2025: Strong early voting numbers— All you need to know
    Alan C. MooreAlan C. Moore
    Subscribe
    Monday, June 16
    • Home
    • US News
    • Politics
    • Business & Economy
    • Video
    • About Alan
    • Newsletter Sign-up
    Alan C. Moore
    Home » Blog » Microsoft: Ransomware Attacks Growing More Dangerous, Complex

    Microsoft: Ransomware Attacks Growing More Dangerous, Complex

    October 17, 2024Updated:October 17, 2024 Tech No Comments
    tr microsoft ransomware attacks grew jpg
    tr microsoft ransomware attacks grew jpg
    Share
    Facebook Twitter LinkedIn Pinterest Email

    According to Microsoft’s Digital Defense record, which was released on October 15, the number of attempted malware attacks on Microsoft customers worldwide has increased significantly in the past year. However, developments in involuntary attack disruption technologies have resulted in fewer of these attacks reaching the crypto phase.

    Microsoft reported 600 million cybercrime and nation-state problems occurring regularly. While malware attempts increased by 2.75 days, successful ransomware efforts decreased by threefold.

    Chart showing the inverse proportion of launched ransomware attacks to successful ransomware attacks.
    According to Microsoft, the inverse ratio of successfully launched ransomware problems suggests that threats are working. Origin: Microsoft Defender for Node

    Major attack types include deepfakes, e-commerce fraud

    Microsoft says it” tracks more than 1, 500 unique risk groups — including more than 600 nation-state risk professional organizations, 300 crime groups, 200 effect operations groups, and hundreds of others”. The best five ransom people — Akira, Lockbit, Play, Blackcat, and Basta — accounted for 51 % of documented problems.

    According to the report, adversaries most frequently exploit social engineering, personality concessions, and risks in public-facing programs or unpatched operating systems. When inside, they frequently tamper with safety items or place remote monitoring tools. Notably, 70 % of successful attacks involved remote encryption, and 92 % targeted unmanaged devices.

    Another main types of attacks included:

    • Network attacks.
    • Cyber-enabled financial scam.
    • Attacks on e-commerce spaces, where credit card transactions do n’t require the card to be physically present.
    • Impersonation.
    • Deepfakes.
    • Account acquisition.
    • Almost 99 % of attacks were password fraud, including identity and social architecture.
    • SIM switching.
    • Social engineering at the support desk, where hackers pretend to be customers to change passwords or connect fresh products.
    • Credential phishing, mainly through phishing-as-a-service tasks. These are frequently brought on by HTML or PDF parts that contain harmful URLs.
    • DDoS problems, which caused a worldwide failure earlier this year.

    In addition, browser tampering was a significant person in the previous month: over 176, 000 incidents that Microsoft Defender XDR discovered in 2024 included security settings tampering.

    Notice: Ransomware hackers can use backup information to extort money from customers.

    Must-read safety cover

    Nation-state, economically determined stars share tactics

    Both financially-motivated danger stars and nation-state players increasingly use the same data stealers and command-and-control systems, Microsoft found. Ironically, financially-motivated actors then start sky personality bargain attacks — a tactic formerly associated with nation-state attackers.

    ” This time, state-affiliated risk players increasingly used legal tools and tactics— and even crooks themselves — to advance their interests, blurring the lines between nation-state backed malicious action and fraudster activity”, the report stated.

    Microsoft tracks major threat actor groups from Russia, China, Iran, and North Korea. These nation-states may either use financial threat actors to make money or ignore what is happening within their borders.

    According to Tom Burt, Microsoft’s corporate vice president of customer security and trust, the ransomware issue highlights the connection between nation-state activities and financially motivated cybercrime. Countries that either profit from these operations or fail to take steps to combat cybercrime within their borders, making this issue even more problematic.

    Expert Evan Dornbush, former NSA cybersecurity expert, offers perspectives on the matter:

    In an email to TechRepublic, he wrote,” This report signals one trend that is currently receiving little attention and likely to define the future of cyber: the amount of money criminals can make.” &nbsp,” Per the Microsoft report, government, as a sector, only makes up 12 % of the aggressors ‘ targeting sets. The majority of the victims are found in the private sector.

    This year, the nation-state threat actors targeted the following industries:

    1. IT.
    2. Education.
    3. Government.
    4. Think tanks and NGOs.
    5. Transportation.

    generative AI is used by both the attacker and the defender.

    Generative AI introduces a new set of questions. Microsoft advises limiting generative AI’s access to sensitive data and making sure that data governance guidelines are followed when using it. The report outlines AI’s significant impacts on cybersecurity:

    • As both attackers and defenders are using AI tools more frequently.
    • With AI, nation-state actors can create deceptive audio and video.
    • AI spear phishing, résumé swarming, and deepfakes are now common.
    • Conventional strategies for limiting foreign influence operations may no longer be effective.
    • Some of the risks posed by the use of AI tools can be reduced by AI policies and principles.
    • Although many governments concur that security is a crucial component of AI development, many others pursue it differently.

    According to Burt,” the sheer volume of attacks must be reduced by effective deterrence,” and while the industry must do more to stop attackers ‘ efforts through better cybersecurity, this needs to be combined with government action to enshrine the results that further deter the most harmful cyberattacks.

    How organizations can prevent common cyberattacks

    Organizations can take steps to stop particular kinds of attacks, according to the Microsoft report. TechRepublic distilled some enactable ideas that are applicable to all industries:

    • Implementing policies like those for multi-factor authentication and attack surface reduction will help to stop attacks at the technique layer.
    • Similarly, use” secure-by-default” settings, which make multi-factor authentication mandatory.
    • Use strong password protection.
    • Test pre-configured security settings, such as security defaults or managed Conditional Access policies, in report-only mode to understand their potential impact before going live.
    • Classify and label sensitive data, and have DLP, data lifecycle, and Conditional Access policies around high-risk data and high-risk users.

    Following the Chinese infiltration of Microsoft government email accounts in July 2023, Microsoft implemented its Secure Future Initiative this year.

    Source credit

    Keep Reading

    Major Outages Impact Google Cloud, OpenAI, More This Week: What We Know

    $14B Meta Investment in Scale AI Boosts Plans for Superintelligence Lab

    UK Passes Data Bill Without Controversial AI Copyright Clause: ‘Evolution, Not Revolution’

    First Known ‘Zero-Click’ AI Exploit: Microsoft 365 Copilot’s EchoLeak Flaw

    The Meta AI App Lets You ‘Discover’ People’s Bizarrely Personal Chats

    NVIDIA Expands AI Dominance in Europe with Major Partnerships and Infrastructure Deals

    Editors Picks

    ‘No Gods or Kings’: Musk posts cryptic message — Here’s the video game that inspired it

    June 16, 2025

    Watch: Iran launches fresh strikes on Israel; missiles seen streaking across Jerusalem skies

    June 16, 2025

    Who is Vance Boelter? Suspect arrested in Minnesota lawmaker shooting; What we know

    June 16, 2025

    THEY GOT HIM: Minnesota Shooter Vance Boelter Apprehended

    June 16, 2025

    In Today’s Modern World, Pakistan Has a Sub-Conventional Army

    June 16, 2025

    NYC Mayoral Polls: Eric Adams seeks re-election as early voting begins— Full list of contenders

    June 16, 2025

    EU chief pushes for diplomatic solution to Israel-Iran crisis in call with Netanyahu

    June 16, 2025

    NYC Primary Elections 2025: Strong early voting numbers— All you need to know

    June 16, 2025

    ASU’s ‘Queer Visual Resource Center’ features sexually explicit art, free condoms

    June 16, 2025

    Where are the men? Research finds record low male enrollment at U. Michigan

    June 16, 2025
    • Home
    • US News
    • Politics
    • Business & Economy
    • About Alan
    • Contact

    Sign up for the Conservative Insider Newsletter.

    Get the latest conservative news from alancmoore.com [aweber listid="5891409" formid="902172699" formtype="webform"]
    Facebook X (Twitter) YouTube Instagram TikTok
    © 2025 alancmoore.com
    • Privacy Policy
    • Terms
    • Accessibility

    Type above and press Enter to search. Press Esc to cancel.