Ransomware Groups Activate Remote Encryption in Attacks-Report

  • Attackers Increase Their Use of Remote Ransomware 62% Annually, Based on Attacks Detected and Stopped by Sophos CryptoGuard Technology

Sophos has today released a report, titled “CryptoGuard: An Asymmetric Approach to the Ransomware Battle,” which found that some of the most prolific and active ransomware groups, including Akira, ALPHV/BlackCat, LockBit, Royal, Black Basta, are deliberately switching on remote encryption for their attacks. In remote encryption attacks, also known as remote ransomware, adversaries leverage a compromised and often under protected endpoint to encrypt data on other devices connected to the same network.

Sophos CryptoGuard is the anti-ransomware technology that Sophos acquired in 2015* and is included in all Sophos Endpoint licenses.

CryptoGuard monitors the malicious encryption of files and provides immediate protection and rollback capabilities, including when the ransomware itself never appears on a protected host.

The unique anti-ransomware technology is a last line of defense in Sophos’ layered endpoint protection, only activating if an adversary triggers it later in the attack chain.

CryptoGuard detected a 62% year-over-year increase in intentional remote encryption attacks since 2022.

“Companies can have thousands of computers connected to their network, and with remote ransomware, all it takes is one under protected device to compromise the entire network. Attackers know this, so they hunt for that one ‘weak spot’—and most companies have at least one. Remote encryption is going to stay a perennial problem for defenders, and based, on the alerts we’ve seen, the attack method is steadily increasing,” said Mark Loman, vice president, threat research at Sophos, and the co-creator of CryptoGuard.

Ransomware Encryptions

Since this type of attack involves encrypting files remotely, traditional anti-ransomware protection methods deployed on remote devices don’t “see” the malicious files or their activity, failing to protect them from unauthorized encryption and potential data loss. Sophos CryptoGuard technology, however, takes an innovative approach to stop this kind of attack, as explained in the Sophos X-Ops article: analyzing the contents of files to see if any data became encrypted to detect ransomware activity on any device in a network, even if there is no malware on the device.

In 2013, CryptoLocker was the first prolific ransomware to utilize remote encryption with asymmetric encryption, also known as public-key cryptography.

Since then, adversaries have been able to escalate the use of these kind of attacks, due to ubiquitous, ongoing security gaps at organizations worldwide and the advent of cryptocurrency.

“When we first noticed CryptoLocker taking advantage of remote encryption ten years ago, we foresaw that this tactic was going to become a challenge for defenders. Other solutions focus on detecting malicious binaries or execution. In the case of remote encryption, the malware and execution reside on a different computer (unprotected) than the one having the files encrypted. The only way to stop it is watching the files and protecting them. That’s why we innovated CryptoGuard,” said Loman.

Read Also: Sophos Anticipates AI-Based Attack Techniques and Prepares Detections

“CryptoGuard does not hunt for ransomware; instead, it zeroes in on the primary targets—the files. It applies mathematical scrutiny to documents, detecting signs of manipulation and encryption.

Notably, this autonomous strategy deliberately does not depend on indicators of breach, threat signatures, artificial intelligence, cloud lookups, or prior knowledge to be effective. By focusing on the files, we can change the power balance between the attackers and the defenders. We’re increasing the cost and complexity for the attackers to successfully encrypt data, so that they will abandon their objectives. This is a part of our asymmetric defense approach strategy.

“Remote ransomware is a prominent problem for organizations, and it is contributing to the longevity of ransomware in general. Given that reading data over a network connection is slower than from a local disk, we have seen attackers, like LockBit and Akira, strategically encrypt only a fraction of each file. This approach aims to maximize impact in minimal time, further reducing the window for defenders to notice the attack and respond. Sophos’ approach to anti-ransomware technology stops both remote attacks and those that encrypt just 3% of a file. We’re hoping to inform defenders about this persistent attack method, so they can properly protect devices.”

Leave a Reply

Your email address will not be published. Required fields are marked *

Next Post

Fuse Network to Launch ZK-Powered Layer-2 Using Polygon CDK

Wed Dec 20 , 2023
Share on Facebook Tweet it Share on Reddit Pin it Share it Email In a groundbreaking collaboration, Fuse Network, a leading Layer-1 blockchain player specializing in scaling Web3 payments, has teamed up with Polygon Labs, a globally acclaimed blockchain technology firm. Fuse embarks on an ambitious journey to create an […]

You May Also Like

Chief Editor

Jacktone Lawi

Meet Jacktone Lawi, a seasoned technology journalist with years of experience in the industry. I have developed my passion for technology during my formative years, which has been instrumental in shaping my career trajectory. My expertise lies in reporting on emerging technologies and their impact on businesses and consumers worldwide. Through my experience I’m well-versed in covering topics such as artificial intelligence, blockchain, cybersecurity, cloud computing, and digital transformation, among others. Throughout my career, I have has demonstrated an exceptional ability to distill complex technical information into accessible and engaging content that resonates with my readers. My writing style is clear, concise, and informative, allowing me to communicate even the most technical concepts to a broad audience. Beyond my writing skills, I have also become known for extensive network of industry contacts and ability to secure exclusive interviews with high-profile figures in the technology world. These connections have enabled me to gain unique insights into the latest trends and developments in the field, giving me a competitive edge in my reporting. In addition to my work as a journalist, I’m also actively engaged in the broader technology community. Where I regularly attend conferences and events, share insights and stays up-to-date on the latest innovations in the industry. Overall, my wealth of experience as a technology journalist have given me a deep understanding of the industry and its impact on society.

Quick Links