Perhaps the most notable of the trends identified is the number of threatening agents who carried out attacks against organisms involved in fighting the pandemic. COVID-19 during 2020.
According to IBM researchers, attacks on research and development organizations treatment of COVID-19, doubled in 2020. These organizations include hospitals, pharmaceutical manufacturers, medical companies and energy companies involved in the COVID-19 supply chain.
According to IBM, the targeting of these organizations is mainly due to the fact that due to the nature of their work they can not withstand any shutdown which can be caused by one attack. So they are much more likely to give in and pay for it ransom requested by the attackers.
According to the company, the construction and energy sectors were second only to financing and insurance, in terms of attacks last year. It is also worth noting that there has been a 50% increase in attacks exploiting vulnerabilities in industrial control systems (ICS).
"In essence, the pandemic reshaped what is considered critical infrastructure at the time and the attackers adapted to it. Many organizations have been pushed to the forefront of action efforts for the first time - either to support COVID-19 research, or to support vaccine and food supply chains, or to produce personal protective equipmentCommented o Nick Rossmann, Global Threat Intelligence Lead by IBM Security X-Force. "The target of the attackers shifted as the timeline of the COVID-19 events unfolded, indicating once again the adaptability, resourcefulness and persistence of cybercriminals."
During 2020, the ransomware became the most popular method of attack, accounting for 23% of all cases analyzed by IBM. THE Sodinokibi was the most productive ransomware family, bringing in at least $ 123 million last year to its operators. It was estimated that about two-thirds of the victims paid the ransom they demanded.
Duplicate blackmail, in which an organization's systems are infected with ransomware and attackers threaten to leak stolen data if the ransom is not paid, is also becoming increasingly popular.
The report also found a 40% increase in malware-based families Linux and a 500% increase in malicious programs written in the Go programming language.