Ransomware experienced explosive growth last year, with businesses and individuals losing more than $1 billion to retrieve their encrypted information.
Ransomware dominated the cyberthreat landscape in 2016, increasing more than 600% over 2015, according to a new report from PhishMe.
PhishMe analyzed more than 2,500 phishing attacks in 2016 to determine the tools and techniques most frequently used by cybercriminals. Ransomware including Locky, Creber, and TeslaCrypt grew rapidly, though other forms of malware designed to steal information also remained popular.
Ransomware tools were used in 90% of all collected malware payload URLs identified by PhishMe throughout 2016, leading to estimated losses of more than $1 billion, the report found. And, as delivery methods grew more sophisticated in Q4 2016, enterprises should expect ransomware attacks to continue to evolve this year, the report stated.
Despite this growth, a large portion of phishing attacks recorded in 2016 came through older malware methods—such as remote access trojans or keyloggers—showing that many cybercriminals remain committed to using more traditional tools to steal private information, the report stated.
“While the spread of ransomware tools dominated industry discussions in 2016, threat actors remained committed to their tried-and-true techniques,” said Aaron Higbee, cofounder and CTO of PhishMe, in a press release. “In addition to focusing on the ‘smash and grab’ of ransomware, threat actors also continue to quietly infiltrate the target’s environment, thus making it increasingly important to detect malware during the delivery phase. This challenges the traditional sense of malware hunting.”
Though ransomware made headlines after large scale attacks on hospitals, schools, and other organizations, attacks known as “quiet malware” were also prevalent. These types of attacks allow cybercriminals to watch the victim over a period of time, assessing their ability to pay a ransom and what amount they can ask for, before deploying the ransomware.
These tools demonstrate how hackers are evolving their techniques to get around traditional security protections, the report noted.