Ransomware gangs are increasingly turning to remote encryption, and that's a huge problem
Remote encryption renders most security tools useless, researchers say
Ransomware is constantly evolving, and the next step in its evolution comes in the form of intentional use of remote encryption.
A new report from Sophos has claimed, remote encryption is a super destructive method of ransomware attack, and its deliberate use is growing more popular by the day, with the company’s anti-ransomware CryptoGuard technology detecting a 62% increase, year-on-year, in intentional remote encryption attacks.
Most of the biggest ransomware operators today, including Akira, ALPHV (AKA BlackCat), LockBit, Royal, and Black Basta, have all deliberately switched on remote encryption for their attacks, Sophos claims.
Hunting weak spots
So what is remote encryption? It’s a form of ransomware in which threat actors leverage a single compromised, unprotected endpoint to encrypt data on other devices connected to the same network, the researchers explained.
“Companies can have thousands of computers connected to their network, and with remote ransomware, all it takes is one underprotected device to compromise the entire network,” said Mark Loman, vice president, threat research at Sophos, and the co-creator of CryptoGuard.
“Attackers know this, so they hunt for that one ‘weak spot’ - and most companies have at least one. Remote encryption is going to stay a perennial problem for defenders, and, based on the alerts we’ve seen, the attack method is steadily increasing.”
Remote encryption is a major issue because traditional anti-ransomware protection methods don’t work well, the researchers further explained. These tools can’t “see” the malicious files, or their activity, and thus cannot protect them from unauthorized encryption and potential data loss.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
While remote encryption is gaining in popularity today, it’s hardly a new method. In fact, it was a decade ago that CryptoLocker utilized this method with asymmetric encryption. “Since then, adversaries have been able to escalate the use of ransomware, due to ubiquitous, ongoing security gaps at organizations worldwide and the advent of cryptocurrency,” the researchers added.
More from TechRadar Pro
- Beware, your login details are being targeted more than ever - here's what to look out for
- Here's a list of the best malware removals today
- These are the best endpoint protection services right now
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.