Ransomware hackers are delving into the archives for some old-school attacks

ransomware avast
(Image credit: Avast)

Ransomware hackers are delving into the archives, looking for old vulnerabilities that could be exploited in new attacks, experts have claimed.

A new report recently published by Cyber Security Works, Ivanti, Cyware, and Securin found that for ransomware operators, “old is still gold”, as more than three-quarters (76%) of all the vulnerabilities being exploited in ransomware attacks were discovered between 2010 and 2019. 

Last year, of the 56 vulnerabilities that were proven to have been used to deploy malware, 20 (35%) were discovered between 2015 and 2019.

Looking for holes

To deploy ransomware, the attackers need to find a vulnerability that will allow them to install malicious code remotely, disable any firewalls or antivirus solutions the victims might have installed on their endpoints, and cover their tracks as they go about the encryption. 

A useful vulnerability can be found anywhere, from the operating system (OS), to any programs the victims might have installed on their devices, to any connected devices such as routers, printers, smart home devices, and similar.

While security researchers, as well as hardware and software vendors, try their best to discover these vulnerabilities before they’re abused, and release a patch to plug the hole, users are often not that quick. As a result, many devices out there are still vulnerable to years-old flaws. Older vulnerabilities are arguably more dangerous than newly discovered ones, as for those there is already a proof-of-concept and a developed compromise methodology. The only thing the attackers need to do in such a case is to find a vulnerable device. 

Last year, the research states, 56 new vulnerabilities used to deploy malware were discovered, among a total of 344 flaws found in 2022 - representing a 19% increase year-on-year. 

“Ransomware is top of mind for every organization whether in the private or public sector,” said Srinivas Mukkamala, Chief Product Officer, Ivanti. “Combating ransomware has been placed at the top of the agenda for world leaders because of the rising toll being placed on organizations, communities and individuals. It is imperative that all organizations truly understand their attack surface and provide layered security to their organization so they can be resilient in the face of increasing attacks.”

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A person at a laptop with a cybersecure lock symbol floating above it.
Hackers are still using old Ivanti bugs to break into networks
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Hands typing on a keyboard surrounded by security icons
35 years on: The history and evolution of ransomware
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Ransomware
Fortinet firewall bugs are being targeted by LockBit ransomware hackers
ransomware avast
AI is helping hackers get access to systems quicker than ever before
Latest in Security
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Latest in News
Microsoft Surface Laptop and Surface Pro devices on a table.
Hate Windows 11’s search? Microsoft is fixing it with AI, and that almost makes me want to buy a Copilot+ PC
Oura Ring 4
Activity tracking on Oura Ring is about to get a whole lot better, but I've got bad news about your step count
Google Maps on a phone being held in someone's hand
Google Maps is getting two key upgrades, for easier route planning and quicker access to Gemini AI
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Gemini on a smartphone.
Gemini 2.5 is now available for Advanced users and it seriously improves Google’s AI reasoning
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025