Media Releases

400 percent rise in ransomware attacks in 2017: Report

F-Secure notes that other ransomware attacks became less common as the year progressed, signaling a shift in how cyber criminals are using the malware.

F-Secure May 03rd 2018

Ransomware attacks grew in volume by over 400 percent in 2017 compared with the previous year. F-Secure attributes this growth to the WannaCry crypto worm in a new report, but notes that other ransomware attacks became less common as the year progressed, signaling a shift in how cyber criminals are using the malware.
 
The Changing State of Ransomware report finds that ransomware evolved as a threat considerably during 2017. Prevalent threats during the year included established ransomware families like Locky, Cryptolocker, and Cerber. But it was WannaCry that emerged as the most frequently seen ransomware threat in 2017: the notorious cryptoworm accounted for 9 out of every 10 ransomware detection reports by the end of the year.
 
But while the WannaCry ransomware family remained prevalent in the second half of 2017, the use of other ransomware by cyber criminals seemed to decline. It’s a phenomenon that F-Secure Security Advisor Sean Sullivan says points to amateur cyber criminals losing interest in ransomware.
 
“After the summer, there was a noticeable shift away from the kind of ransomware activity that we’ve seen in the last year or two,” said Sullivan. “The last couple of years saw cyber criminals developing lots of new kinds of ransomware, but that activity tapered off after last summer. So it looks like the ransomware gold rush mentality is over, but we already see hard core extortionists continuing to use ransomware, particularly against organizations because WannaCry showed everyone how vulnerable companies are.”
 
The report notes that while there were signs of ransomware declining as 2017 closed, there’s also evidence suggesting that ransomware use will gravitate to more corporate focused attack vectors, such as by compromising organizations via exposed RDP ports. The SamSam ransomware family is known to use this approach and has already infected several US-based organizations this year, including the city of Atlanta’s IT systems in a recent attack.*
 
Other significant findings in the report include:

  • WannaCry, followed by Locky, Mole, Cerber, and Cryptolocker were the most prevalent ransomware families in 2017
  • Ransomware attacks in 2017 increased by 415 percent compared with 2016
  • WannaCry remained active in the latter half of 2017, with the majority of F-Secure’s detection reports coming from Malaysia, Japan, Columbia,   Vietnam, India, and Indonesia
  • 343 unique families and variants of ransomware were discovered in 2017, an increase of 62 percent over the previous year
  • With the exception of WannaCry, new and existing ransomware use seemed to decline toward the end of the year  

 
According to Sullivan, there are several factors that are contributing to the apparent change in how ransomware is being used. “The price of bitcoin is probably the biggest factor, as that’s made crypto mining a lot more attractive and arguably less risky for cyber criminals. I also think revenues are probably falling as awareness of the threat has encouraged people to keep reliable backups, as has skepticism about how reliable criminals are on delivering their promises of decrypting data. But cyber criminals will always try to pick low hanging fruit, and they’ll return to ransomware if the conditions are right.”