{"id":15381,"date":"2021-06-09T05:15:00","date_gmt":"2021-06-09T05:15:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/06\/09\/nefilim-ransomware-targets-victims-with-1-billion-revenue\/"},"modified":"2021-06-09T05:15:00","modified_gmt":"2021-06-09T05:15:00","slug":"nefilim-ransomware-targets-victims-with-1-billion-revenue","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/06\/09\/nefilim-ransomware-targets-victims-with-1-billion-revenue\/","title":{"rendered":"Nefilim Ransomware Targets Victims with $1 Billion Revenue"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\"><!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Trend Micro report takes a deep dive into one of the most successful threat groups in modern                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211; 9 June 2021 &#8211;<b>\u00a0<\/b><a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\na global&#13;<br \/>\ncybersecurity leader, today released a case study of the Nefilim&#13;<br \/>\nransomware group, providing insight into the inner-workings of modern&#13;<br \/>\nransomware attacks. The report gives valuable insight into how ransomware&#13;<br \/>\ngroups have evolved, operate under the radar and how advanced threat detection&#13;<br \/>\nand response platforms can help stop them.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The approach of modern ransomware families makes&#13;<br \/>\ndetection and response significantly more difficult for already stretched SOC&#13;<br \/>\nand IT security teams. This matters not only to the bottom line and corporate&#13;<br \/>\nreputation, but also the wellbeing of SOC teams themselves. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b><i>\u00a0<\/i><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b><i>To read the report &#8220;Modern Ransomware&#8217;s&#13;<br \/>\nDouble Extortion Tactics and How to Protect Enterprises Against Them&#8221;: <\/i><\/b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/news\/cybercrime-and-digital-threats\/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them\">https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/news\/cybercrime-and-digital-threats\/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them<\/a><b><i>.&#13;<br \/>\n<\/i><\/b><b><i\/><\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Modern ransomware attacks are highly targeted, adaptable&#13;<br \/>\nand stealthy \u2013 using proven approaches perfected by APT groups in the past. By&#13;<br \/>\nstealing data and locking key systems, groups like Nefilim look to extort&#13;<br \/>\nhighly profitable global organizations,&#8221; said Bob McArdle, director of&#13;<br \/>\ncybercrime research for Trend Micro. &#8220;Our latest report is a must-read for&#13;<br \/>\nanyone in the industry who wants to understand this fast-growing underground&#13;<br \/>\neconomy inside-out, and how solutions like Trend Micro Vision One can help them&#13;<br \/>\nhit back.&#8221; <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Of the 16 ransomware groups studied from March 2020 to&#13;<br \/>\nJanuary 2021, Conti, Doppelpaymer, Egregor and REvil led the way in terms of&#13;<br \/>\nnumber of victims exposed\u2014and Cl0p had the most stolen data hosted online at&#13;<br \/>\n5TB. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>However, with its ruthless focus on organizations posting&#13;<br \/>\nmore than $1 billion in revenue, Nefilim extorted the highest median revenue. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>As the report reveals, a Nefilim attack typically&#13;<br \/>\ninvolves the following stages:<\/p>\n<ul>\n<li>Initial access that exploits weak credentials&#13;<br \/>\non exposed RDP services or other externally facing HTTP services.<\/li>\n<li>Once inside, legitimate admin tools are used&#13;<br \/>\nfor lateral movement to find valuable systems for data theft and encryption.<\/li>\n<li>A &#8220;call home&#8221; system is set up with Cobalt&#13;<br \/>\nStrike and protocols that can pass through firewalls, like HTTP, HTTPS and DNS.<\/li>\n<li>Bulletproof hosting services are used for&#13;<br \/>\nC&amp;C servers.<\/li>\n<li>Data is exfiltrated and published on&#13;<br \/>\nTOR-protected websites later to extort victim. Nefilim published around 2TB of&#13;<br \/>\ndata last year.<\/li>\n<li>Ransomware payload is launched manually once&#13;<br \/>\nenough data has been exfiltrated.<\/li>\n<\/ul>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend Micro has <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/locked-loaded-and-in-the-wrong-hands-legitimate-tools-weaponized-for-ransomware-in-2021\">previously warned<\/a> of&#13;<br \/>\nthe widespread use of legitimate tools such as AdFind, Cobalt Strike, Mimikatz,&#13;<br \/>\nProcess Hacker, PsExec, and MegaSync, to help ransomware attackers achieve&#13;<br \/>\ntheir end goal while staying hidden. This can make it challenging for different&#13;<br \/>\nSOC analysts looking at event logs from different parts of the environment to&#13;<br \/>\nsee the bigger picture and spot attacks.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend Micro Vision One monitors and correlates suspicious&#13;<br \/>\nbehavior across multiple layers\u2014endpoints, emails, servers, and cloud&#13;<br \/>\nworkloads\u2014to ensure there&#8217;s no hiding space for threat actors. This makes for&#13;<br \/>\nfaster incident response times, and teams can often stop attacks before they&#8217;ve&#13;<br \/>\nhad a chance to make a serious impact on the organization.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-06-09\/81214\/nefilim-ransomware-targets-victims-with-1-billion-revenue\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro report takes a deep dive into one of the most successful threat groups in modern HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211; 9 June 2021 &#8211;\u00a0 (;),&#13; a global&#13; cybersecurity leader, today released a case study of the Nefilim&#13; ransomware group, providing insight into the inner-workings of modern&#13; ransomware attacks. The report gives valuable insight &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15381"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=15381"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/15381\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=15381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=15381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=15381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}