Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Group-IB Publishes Hi-Tech Crime Annual Threat Report 2022/2023
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > Cyber > Group-IB Publishes Hi-Tech Crime Annual Threat Report 2022/2023
Cyber

Group-IB Publishes Hi-Tech Crime Annual Threat Report 2022/2023

Editorial Desk
Last updated: January 17, 2023 11:28 pm
Editorial Desk
Share
SHARE

Group-IB, a global cybersecurity leader headquartered in Singapore , has today published its latest annual threat report Hi-Tech Crime Trends 2022/2023.

The report, produced by Group-IB’s Threat Intelligence unit identifies the most pertinent cyber risks faced by companies in the Asia Pacific region. The report reveals that ransomware operations remain the top cyber threat to public and private companies across the world.

Between H2 2021 and H1 2022, the number of companies that had their information uploaded onto the ransomware dedicated leak sites (DLS) was up by 22% year-on-year to 2,886, including data related to 322 companies from the Asia Pacific region.

For the second consecutive year, Group-IB researchers observed the increasing impact of initial access brokers (IABs) on the ransomware market in APAC and beyond.

Group-IB recorded 2,348 instances of corporate network access being sold on dark web forums or privately by IABs, twice as many in the preceding period. The number of brokers also grew from 262 to 380,leading to a drop in pricesmaking attacks from ransomware gangs and other threat actors more affordable.

In the APAC region, the number of network access offers almost tripled to 382 in H2 2021 – H1 2022, resulting in a drop in price of total offers of 32%.

APAC continues to be the main theater of operations for nation-state cyber threat actors, with Group-IB researchers detecting the activity of more than 35 advanced persistent threat (APT) actors.

For the 11th consecutive year, the Hi-Tech Crime Trends report analyzes the various aspects of the cybercriminal industry’s operations, examines attacks, and provides forecasts for the threat landscape for various sectors such as the financial industry, telecommunications, manufacturing and energy.

Threat Report offers a global overview of the threat landscape

Group-IB’s hands-on experience in investigating cybercrime coupled with an innovative suite of products and services allow for a thorough understanding of underground trends and activities, and  long-term predictions to assist cybersecurity teams around the world to tailor their cyber defense.

InsatIABle appetite

Between H2 2021 and H1 2022, Group-IB’s Threat Intelligence unit analyzed underground advertisements and identified a significant increase in the sale of corporate access.

A total of 2,348 instances were recorded, which is  twice as many as the previous period (1,099 access offers). Of these, 2,111 offers provided information about the country and 1,532 specified the victim’s industry.

IABs have significantly expanded their presence worldwide, with the number of countries where they broke into corporate networks increased by 41%: from 68 to 96 during this period.

Similar to the previous year, US-based companies were the most sought after target among IABs, , with almost a quarter of all discovered access offers related to US companies (558).

The industries most affected by IABs were manufacturing (5.8% of all companies), financial services (5.1%), real estate (4.6%), and education (4.2%).

Dmitry Volkov, CEO of Group-IB says initial access brokers play the role of oil producers for the whole underground economy.

“They fuel and facilitate the operations of other criminals, such as ransomware and nation-state adversaries. As access sales continue to grow and diversify, IABs are one of the top threats to watch in 2023.”

“Private and public companies in the Asia Pacific region  should consider setting up a threat intelligence program to monitor for compromised credentials of their workforce.” said Volkov

The Asia-Pacific region saw a significant number of network access offers with India (16.8%) recording the highest number, followed by

  • Australia (12.8%)
  • China (11.8%)
  • Indonesia (7.3%)
  • Thailand (7.3%)
  • Malaysia (4.5%)
  • Taiwan (4.5%)
  • Vietnam (4.2%)
  • Japan (3.4%)
  • Singapore 3.4%

All network access offers in the region were detected between the second half of 2021 and the first half of 2022.

One of the most prolific initial access brokers active in APAC, nicknamed NikaC, offered access to seven financial companies’ networks, mainly in the Asia-Pacific. Most involved access to the corporate email of top managers.

In line with the global trend, the total cost of offers of access to the Asia Pacific companies’ networks traded on underground forums decreased by 32.3% to $2,238,924, due to a significant increase in supply.

The number of APAC-related network access offers almost tripled from 133 in H2 2020 – H1 2021 to 382 in the following period, which explains the growing number of ransomware incidents in the region. In the review period, ransomware gangs posted sensitive information belonging to 322 APAC companies on DLS.

Group-IB team highlights that effective corporate cybersecurity teams should take into account relevant knowledge about the attackers active in the region and suggests considering solutions based on the data from real-life cyber investigations and incident response operations in APAC.

A devil’s ransom

The report found that ransomware continues to be a major threat to companies worldwide, with 2,886 companies having their information, files, and data published on ransomware DLS between H2 2021 and H1 2022, a 22% increase compared to the 2,371 companies affected during the previous period (H2 2020 – H1 2021).

It’s worth noting that the actual number of ransomware attacks is believed to be significantly higher as many victims chose to pay the ransom and some ransomware gangs do not use DLS.

Based on the analysis of ransomware DLS, Group-IB discovered that companies in North America (50% of companies whose data was leaked by ransomware gangs) were the most affected by this form of attack.

Comparatively, the APAC region was the third-most affected region, with 322 companies having their data published on DLS. The major affected markets in this region were Australia (55 companies), India (38 companies), China (37 companies), Japan (31 companies), and Thailand (27 companies).

Additionally, 17 companies in Singapore had information published on DLS. The most prolific ransomware gang in the APAC market was Lockbit, responsible for 41% of publications from the region on dedicated leak sites.

Second in this list was Conti, a Russian-speaking ransomware group that launched the devastating ARMattack campaign at the end of 2021, which was responsible for 7% of leaks, and third was Hive (6% of leaks).

Group-IB’s analysis of the threat posed by ransomware gangs also revealed that globally, the largest number of ransomware-related data leak victims were found in the following sectors:

  • Manufacturing (295 companies)
  • Real estate (291)
  • Professional services (226)
  • Transportation industries (224)

In the APAC region, most of the victims posted on DLS conducted business in the manufacturing (45), financial (20), and energy (15) sectors.

Ransomware is likely to remain the major threat for businesses and governments across the globe in 2023,” says Dmitry Volkov, CEO at Group-IB.

“Ransomware gangs have been able to craft a stable market for their criminal enterprises, and the ransom demands issued to companies once they have been attacked are continuing to rise rapidly. Many of the most prominent ransomware gangs have turned into criminal start-ups.”

“They have a rigid hierarchy and bonuses for overachievement. While the growth trends might slow down, it is likely that the ransomware market could consolidate further, continuing a trend seen in H2 2021 – H1 2022.” he said

Stealing the limelight

One of the most notable changes to the global threat landscape is the increasing popularity of logs obtained with the use of information stealers — malware that gathers personal details from the user’s browser metadata.

These stealers can obtain credentials, bank cards, cookies, browser fingerprints, etc. Group-IB found that between July 1, 2021 and June 30, 2022, over 96 million logs were offered for sale, with most of the compromised data coming from US users (80%), with the UK (5.4%), India (4.6%), Indonesia (2.4%), and Brazil (2%) trailing behind.

Group-IB experts discovered over 400,000 Single Sign-On logs among these 96 million logs. SSO is a widely used corporate authentication method that uses a single pair of credentials to get access to multiple services, making them highly sought after by cybercriminals as they allow them to get into several systems at a time with little effort.

As discovered by Group-IB researchers, the threat actor behind the recent attack on Uber purchased stealer logs on one of the underground marketplaces for US$20. These logs contained  SSO credentials of at least two Uber employees. 

“It is quite concerning what a cybercriminal with US$20 and modest technical skills is capable of these days,” says Dmitry Volkov, CEO at Group-IB.

“With remote work and SSO services becoming more prevalent, instances of access to corporate networks started appearing in stealer logs more often.”

“Attacks on companies through their employees will become one of the main infection vectors. A silver bullet against such attacks doesn’t exist.”

“This trend highlights the need for companies to improve their cybersecurity across all layers, including training employees to respond to social engineering, enhancing detection and response capabilities, and of course, monitoring the cybercriminal underground for compromised employee records and offers to sell access to their networks.” he said

APAC — main theater of APT operations

The Group-IB Threat Intelligence team found that the largest number of attacks conducted by nation-state threat actors took place in the Asia-Pacific region. Between H2 2021 – H1 2022, the activity of more than 35 APT groups was detected in APAC.

Threat actors from India, China, Taiwan, South Korea and Vietnam were the most active. Due to growing tensions in cyberspace globally, new players have emerged. For instance, at the end of 2022, Group-IB researchers discovered a previously unknown APT Dark Pink that is believed to originate from the Asia-Pacific region.

Dark Pink’s confirmed victims include two military bodies in the Philippines and Malaysia, government agencies in Cambodia, Indonesia and Bosnia and Herzegovina, and a religious organization in Vietnam.

“It is not surprising that the overwhelming majority of known APT victims were government and military organizations (33%), followed by financial (6.3%) and telecommunications companies (5.8%),” says Dmitry Volkov.

“The tense political environment will lead to further increase in attacks on energy, telecommunications, and manufacturing infrastructure in 2023. Not only politically motivated groups will be highly active, but also financially-driven cybercriminals. “

“This could lead to far-reaching DDoS attacks and substantial leaks of sensitive information, as well as major financial thefts.” Volkov concluded.

By Editorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article ACS warns business approvals - tech news ACS Warns Against Automatic Business Approvals
Next Article Global Financial Crime Prevention Software Global Financial Crime Prevention Software Spend to Surpass $28 Billion by 2027
Leave a comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Group-IB latest annual threat report Hi-Tech Crime Trends 2022/2023

Tech Articles

Healthcare AI

AI Is Transforming Healthcare By Improving Workflows And Resource Management

Artificial Intelligence (AI) is transforming every industry. In healthcare, there…

October 12, 2024
Attitudes Toward Work Manifest The Rise of AI

Did Our Collective Attitudes Toward Work Manifest The Rise of Artificial Intelligence? (AI)

It’s definitely something to think about. There’s a fine line…

November 26, 2024
AI Fatigue - Artificial Intelligence Feels Like A Broken Record

AI Fatigue: Why The Buzz Around Artificial Intelligence Sounds Like A Broken Record

The endless cycle of AI announcements has gone from exciting…

November 23, 2024

Recent News

Global scam operation ‘Classiscam’
Cyber

Global scam operation ‘Classiscam’ expanded to Singapore

9 Min Read
Proposed 2024 Cyber Security Bill & Related Legislative Reforms - AIIA
Cyber

AIIA Welcomes Proposed 2024 Cyber Security Bill & Related Legislative Reforms

3 Min Read
Tech News - Thousands of donors to Australia - Information leaked
Cyber

Thousands Of Australian Charity Doners Private Information Leaked On The Dark Web

10 Min Read
Cyber-Attacks in Victoria Expose Critical Vulnerabilities
Cyber

Cyber-Attacks In Victoria Expose Critical Vulnerabilities Across Government and Industry Sectors

6 Min Read
Tech News

Tech Business News

Stay up to date with the latest technology & business news trends from Australia and the around the world.

Technology News reports and whitepaper publishing services are available along with media and advertising options

Our Australian technology news includes People, Business, Science, World News, Local News, Guest publishers, IT News & Tech News Australia | Tech News was established in 2019

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

December, 10, 2024

Contact

Contact Information.
Melbourne, Australia

Werribee 3030

Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.


Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2024

Welcome Back!

Sign in to your account