Skip to main content

Digital Trends may earn a commission when you buy through links on our site. Why trust us?

Ransomware gangs are evolving in new and dangerous ways

With digital technology growing at a rapid pace, ransomware gangs and their methods continue to advance at an aggressive rate as well.

This observation was detailed by cybersecurity and antivirus giant Kaspersky via a new report, highlighting fresh ransomware trends that have materialized throughout 2022.

Silhouette of male hand typing on laptop keyboard at night.
Andrew Brookes/Getty Images

Although leading cyber gangs have seen operations ceasing due to shutdowns, groups are still finding ways to develop dangerous strains of malware and ransomware. And their efforts are bearing fruits, Kaspersky stresses.

Recommended Videos

In particular, the company singled out brand new “cross-platform capabilities”, in addition to “updated business processes” and more.

Please enable Javascript to view this content

Before we delve into the aforementioned aspects, it’s important to outline what ransomware is exactly. Simply put, it’s a type of code or software that affects files, folders, or the entire operating system of a PC.

Once it has successfully infiltrated its target, ransomware groups will then demand money from the victim if they want to unlock access to their computer.

“If last year we said ransomware is flourishing, this year it’s in full bloom.”

“Ransomware operations have come a long way — from clandestine and amateur beginnings to fully-fledged businesses with distinctive brands and styles that rival each other on the dark web. They find unusual ways to attack their victims or resort to newsjacking to make their attacks more relevant,” Kaspersky said.

The rise of cross-platform programming languages

As for the “prolific use” of cross-platform capabilities, Kaspersky points out that this method is particularly effective in damaging “as many systems as possible with the same malware by writing code that can be executed on several operating systems at once.”

Cross-platform programming languages, Rust and Golang, started picking up steam among the ransomware community during the latter stages of 2021.

For example, a leading group that is an ever-present name in the ransomware space, Conti, has managed to design a variant that is spread via certain affiliates in order to target Linux-based systems.

BlackCat, labeled as a “next-generation” malware gang, was mentioned as another group — one that has apparently attacked more than 60 organizations since December 2021. Rust was its language of choice for developing malware strains.

Elsewhere, a group known as DeadBolt relied on Golang instead for its ransomware endeavors. This cyber gang is notorious for its attacks on QNAP (network-based storage devices from a Taiwanese company).

Ransomeware groups are starting to evolve

Another trend that Kaspersky detailed is the fact that ransomware groups have not only been relying on more advanced tactics for their overall operations, but throughout late 2021 and the opening stages of 2022, they’ve also “continued activities to facilitate their business processes, including regular rebranding to divert the attention of the authorities, as well as updating exfiltration tools.”

Certain groups have developed and started to use entire toolkits that “resembled ones from benign software companies.”

“Lockbit stands out as a remarkable example of a ransomware gang’s evolution. The organization boasts an array of improvements compared to its rivals, including regular updates and repairs to its infrastructure. It also first introduced StealBIT, a custom ransomware exfiltration tool that enables data exfiltration at the highest speeds ever – a sign of the group’s hard work put towards malware acceleration processes.”

Dmitry Galov, a senior security researcher at Kaspersky’s Global Research and Analysis Team, commented on the state of affairs with a summary:

“If last year we said ransomware is flourishing, this year it’s in full bloom. Although major ransomware groups from last year were forced to quit, new actors have popped up with never before seen techniques. Nevertheless, as ransomware threats evolve and expand, both technologically and geographically, they become more predictable, which helps us to better detect and defend against them.”

Google, meanwhile, somewhat mirrored the same remark when it analyzed the record number of zero-day hacks in 2021.

“Zero-day exploits are considered one of the most advanced attack methods an actor can use, so it would be easy to conclude that attackers must be using special tricks and attack surfaces. But instead, the zero-days we saw in 2021 generally followed the same bug patterns, attack surfaces, and exploit “shapes” previously seen in public research.”

Still, that’s not to say that malware and ransomware don’t pose a dangerous threat in today’s digitally-driven world. In fact, ransomware in particular is an extremely lucrative business for cybercriminals. In 2021 alone, this crime type saw $49.2 million in losses for innocent individuals.

The fact that the rise in malware is more commonplace than ever before is not going unnoticed among the leading technology giants.

Microsoft recently confirmed a new initiative where businesses can use the company’s in-house security services and experts to combat cybercrime and strengthen their digital security measures.

Zak Islam
Former Digital Trends Contributor
Zak Islam was a freelance writer at Digital Trends covering the latest news in the technology world, particularly the…
A new malware threat to macOS adds to the data-stealing surge
Apple MacBook Pro 16 downward view showing keyboard and speaker.

If you still think Macs are inherently safe from malware, think again.

Mac users have another threat to worry about. Cthulhu Stealer, a new Mac malware threat, tries to steal sensitive data such as passwords and cryptocurrency wallets, Cado Security reports in a blog post. The malware threat disguises itself as authentic software to gather login credentials.

Read more
This new threat proves that Macs aren’t immune from malware
A concept image of a hacker at work in a dark room.

Despite constant warnings, many Mac users have come to believe their computers are safe from malware attacks. A new threat targeting Mac users called Banshee Stealer, however, refutes that notion. As reported on by security firm Elastic Labs, Banshee Stealer targets popular browsers and crypto wallets and even attempts to steal data from iCloud Keychain passwords and Notes.

"Banshee Stealer targets a wide range of browsers, cryptocurrency wallets, and around 100 browser extensions, making it a highly versatile and dangerous threat," Elastic Security Labs said in a report on Thursday.

Read more
This new Google Chrome security warning is very important
The Google Chrome logo on a black phone which is resting on a red book

Google is changing how it warns its users about suspicious files on Chrome by adding new full-page warnings and cloud scanning regarding suspicious downloads, according to Windows Report. This is an attempt to explain more precisely why it blocks specific downloads. Google says that the AI models will divide the warning into two categories: "suspicious" or "dangerous."

The new warning system primarily benefits those using the anti-phishing Enhanced protection feature. The files users upload to the cloud for an automatic scan and those that undergo a deep scan are 50 times more likely to have the AI flag them as malware.

Read more