According to a cybersecurity company’s report, the LockBit ransomware strain is the biggest digital extortion threat to all areas and practically all global industries. Researchers discovered that LockBit was used in more than a quarter of global ransomware and digital extortion (R&DE) attacks analyzed from January 2022 to September 2023. During the period, it included 30% of all R&DE attacks in Europe and 25% in North America. However, the cybersecurity company stated that the overall proportion of cyberattacks that LockBit accounts for is decreasing. It’s most likely because the R&DE landscape is becoming more diverse, with ransomware-as-a-service (RaaS) offerings decreasing the hurdles to entry for threat actors.
The researchers stated that LockBit has historically been under-deployed in North America in comparison to other regions, including Europe. 40% of LocBit victims on average were from North America, however, there’s an indication that this is on the rise, with 50% projected by the end of 2023. Manufacturing, construction, retail, legal and consulting, and healthcare were the industries most frequently targeted by LockBit in North America between January 2022 and September 2023. LockBit accounted for 43.41% of R&DE attacks in Q1 2022, however, it fell to 28.48% in the final quarter of Q3 2023.
Because of the multiplicity of LockBit operators, various intrusion tactics were used to deploy the payload. The following were the key techniques identified:
Even though the number of R&DE attacks LockBit accounts for is decreasing, the cybersecurity company believes the strain will continue to be one of the biggest threats against all industries in all locations. Additionally, LockBit affiliates are shifting their focus to companies that are likely to pay ransomware demands, including professional services, education, and financial sector companies.
The LockBit ransomware strain was discovered in September and is distributed as a RaaS service. It’s popular among various threat actors due to the quickness and worm-like features that allow self-propagation throughout compromised networks. Recently, the strain is thought to be responsible for numerous high-profile ransomware attacks, including Royal Mail, Boeing, and the Industrial and Commercial Bank of China (ICBC). According to a June 2023 report, LockBit was the most active ransomware strain when it came to total victims from January to May 2023.
With more ransomware groups becoming global threats to all industries, companies need to remain vigilant of the latest threat landscape and regularly update their networks’ security infrastructure. At SpearTip, our engineers and analysts work continuously monitoring companies’ data networks for potential ransomware threats at our 24/7/365 Security Operations Center and are ready to respond to incidents at a moment’s notice. Our IR planning engages a three-phase approach, which includes pre-incident, active incident, and post-incident planning processes. In the pre-incident aspect, SpearTip identifies key stakeholders and decision-makers, critical data, and potential access points and then engages in a live test, after which we offer remediation guidance. To benefit companies during an incident, we assist in developing a communications plan designed to detect and isolate the precise threat with a customized strategy map. The post-incident planning process development includes root cause and investigative audit, improvement analysis, and backup recovery. Our ShadowSpear Platform, an integrable managed detection and response tool, uses comprehensive insights through unparalleled data normalization and visualization to expose sophisticated unknown and advanced threats.
If your company is experiencing a breach, call our Security Operations Center at 833.997.7327 to speak directly with an engineer.