Big Data
Cloud Computing
Data Center
Hardware
HR, Finance, Marketing
Internet
IT Management
IT-Security
Mobile
Network
Software
客戶: Akamai Technologies GmbH
格式: 白皮書
尺寸: 3.2 MB
語言: 英語
日期: 17.05.2024
Ransomware on the Move
Evolving Exploitation Techniques and the Active Pursuit of Zero-Days
In the evolving ransomware landscape, adversaries are increasingly shifting from phishing to vulnerability exploitation, enhancing both the scope and sophistication of their attacks. Our previous report, "Slipping Through the Security Gaps," detailed this trend, highlighting how ransomware groups aggressively exploit vulnerabilities and use methods like in-house zero-day attack development and bug bounty programs. These groups are willing to invest financially, either by paying hackers to find flaws in their ransomware software or by purchasing access to targets through initial access brokers (IABs).