• About
  • Subscribe
  • Contact
Friday, June 20, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Process Incident Response

Ransomware-as-a-service, weapon of choice for cybercriminals

FutureCISO Editors by FutureCISO Editors
November 6, 2023
Image by Egonetix_xyz from Pixabay

Image by Egonetix_xyz from Pixabay

Share on FacebookShare on Twitter

Ransomware-as-a-service (RaaS) is now the weapon of choice for cybercriminals, according to OpenText’s Nastiest Malware of 2023, an annual ranking of the year’s biggest malware threats to determine the most notorious malware trends. 

Ransomware gangs 

Four new ransomware gangs topped the list with newcomer Cl0p taking the lead as this year’s nastiest malware after its MOVEit campaign demanded exorbitant ransoms. 

“A key finding this year is the RaaS business model is another win for the bad guys. Profit sharing and risk mitigation are top contributors to RaaS success along with the ability to easily evade authorities,” said Muhi Majzoub, EVP and chief product officer, of OpenText. 

“There is a silver lining as research shows only 29% of businesses pay ransom, an all-time low. These numbers indicate people are taking threats seriously and investing in security to be in a position where they do not need to pay ransom.”

Muhi Majzoub

2023 Nastiest Malware

1. Cl0p, a RaaS platform, became famous following a series of cyberattacks and exploited a zero-day vulnerability in the MOVEit Transfer file software developed by Progress Software.

2. Black Cat, presumed to be the successor to the REvil ransomware group, has built their RaaS platform on the Rust programming language. 

3. Akira, suspected heir to Conti, primarily targets small to medium-sized businesses due to the ease and turnaround time. 

4. Royal, presumed to be a descendant of Ryuk, uses Whitehat penetration testing tools to move laterally in an environment to gain control of the entire network. 

5. Lockbit 3.0, a main stain on the list and last year’s winner is now more modular and evasive than its predecessors. 

Related:  Gamification and cyber security education for Gen Z workers

6. Black Basta is one of the most active RaaS threat actors and is also considered to be yet another descendant of the Conti ransomware group. 

Tags: cybersecuritymalwareOpenTextRansomware as a Service
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • How organisations should transform their cybersecurity strategy for agentic AI
  • PodChats for FutureCISO: AI-powered ransomware: Time to rethink data resilience
  • The Game Plan: Navigate evolving threats and compliance demands
  • APAC's AI growth risks data security without strong governance
  • Networks must evolve or face failure, warns Cisco

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl