Ransomware operators have adopted a dastardly new strategy

security
(Image credit: Shutterstock / binarydesign)

A number of different ransomware groups have adopted a new strategy designed to further intimidate victims: harassment over the phone.

Reports from multiple cybersecurity firms suggest the trend emerged in late summer and is targeted primarily at businesses suspected of using data backups to restore systems after an attack.

Ransomware operators known to have contacted victims via telephone include Sekhmet, Maze, Conti and Ryuk. According to security company Coveware, recurring call scripts suggest these groups may have outsourced the task to the same call center.

“We are aware of a 3rd party IT company working on your network. We continue to monitor and know that you are installing SentinelOne antivirus on all your computers. But you should know that it will not help,” one victim was told over the phone.

“If you want to stop wasting your time and recover your data this week, we recommend that you discuss this situation with us in the chat or the problems on your network will never end.”

Evolution of ransomware

Since ransomware grew to prominence in the mid-2000s, attacks have become increasingly sophisticated and operators have deployed ever more dastardly tactics. The most significant development in the space can be seen in the frequency with which data is now exfiltrated as part of an attack. 

Previously, ransomware simply encrypted files on a business’s network, making them inaccessible, but this problem could be resolved by restoring data from a backup. However, by lifting corporate data as well as encrypting systems, ransomware operators give themselves far greater leverage in negotiations, over which the threat of a data leak looms large.

The use of phone calls as a means of intimidation can be seen as another step in the evolution of this highly effective form of cyberattack.

This year alone, multiple high-profile companies have fallen victim to ransomware, including Canon, Capcom, Kmart, Equinix and Cognizant. Operators also launched attacks against healthcare facilities at the height of the pandemic, preventing proper care from being administered.

Even in cases in which the business pays the ransom, there can be no guarantee the stolen data is deleted, opening the door to secondary extortion attempts.

Via ZDNet

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Latest in Security
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Meta warns of worrying security flaw hitting open source type software
Hand holding smartphone and scan fingerprint biometric identity for unlock her mobile phone
Biometrics add another layer of security to passwordless authentication
Data leak
Hacked Tata Technologies data leaked by ransomware gang
Latest in News
Google Gemini Flash 2.0 Images
I tried Gemini's new AI image generation tool - here are 5 ways to get the best art from Google's Flash 2.0
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Eurocom Raptor X18
At $15,000, this massive 256GB RAM laptop makes Apple's MacBook Pro look affordable, tiny and very, very slow
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character
A graphic of the PC Gaming Show
Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
A close up of The Daily podcast from Pocket Casts' web page
‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web player free to all