Ransomware gangs are increasingly turning to remote encryption, and that's a huge problem

Lock on Laptop Screen
(Image credit: Shutterstock.com) (Image credit: Future)

Ransomware is constantly evolving, and the next step in its evolution comes in the form of intentional use of remote encryption.

A new report from Sophos has claimed, remote encryption is a super destructive method of ransomware attack, and its deliberate use is growing more popular by the day, with the company’s anti-ransomware CryptoGuard technology detecting a 62% increase, year-on-year, in intentional remote encryption attacks. 

Most of the biggest ransomware operators today, including Akira, ALPHV (AKA BlackCat), LockBit, Royal, and Black Basta, have all deliberately switched on remote encryption for their attacks, Sophos claims.

Hunting weak spots

So what is remote encryption? It’s a form of ransomware in which threat actors leverage a single compromised, unprotected endpoint to encrypt data on other devices connected to the same network, the researchers explained.  

“Companies can have thousands of computers connected to their network, and with remote ransomware, all it takes is one underprotected device to compromise the entire network,” said Mark Loman, vice president, threat research at Sophos, and the co-creator of CryptoGuard.

“Attackers know this, so they hunt for that one ‘weak spot’ - and most companies have at least one. Remote encryption is going to stay a perennial problem for defenders, and, based on the alerts we’ve seen, the attack method is steadily increasing.”

Remote encryption is a major issue because traditional anti-ransomware protection methods don’t work well, the researchers further explained. These tools can’t “see” the malicious files, or their activity, and thus cannot protect them from unauthorized encryption and potential data loss. 

While remote encryption is gaining in popularity today, it’s hardly a new method. In fact, it was a decade ago that CryptoLocker utilized this method with asymmetric encryption. “Since then, adversaries have been able to escalate the use of ransomware, due to ubiquitous, ongoing security gaps at organizations worldwide and the advent of cryptocurrency,” the researchers added.

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
ransomware avast
AI is helping hackers get access to systems quicker than ever before
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
AWS S3 feature abused by ransomware hackers to encrypt storage buckets
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Ransomware attack on a computer
Ransomware attacks surged in 2024 as hackers looked to strike faster than ever
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Interlock ransomware attacks highlight need for greater security standards on critical infrastructure
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras
Security padlock and circuit board to protect data
Trust in digital services around the world sees a massive drop as security worries continue
A Lego Pikachu tail next to a Pebble OS watch and a screenshot of Assassin's Creed Shadow
ICYMI: the week's 7 biggest tech stories from LG's excellent new OLED TV to our Assassin's Creed Shadow review
Samuel and Romy standing very close together in A24's Babygirl movie
Everything new on Max in April 2025, including A24's Babygirl and The Last of Us season 2
An AMD Radeon RX 9070 XT made by Sapphire on a table with its retail packaging
AMD’s secret weapon against Nvidia seems to be stock – way more RX 9070 GPUs are rumored to be hitting shelves than RTX 5000 models