• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Managed Service, Network Security, News

CISA Warns of Increased Globalized Threat of Ransomware

Ransomware tactics and techniques are continuing to evolve and place an immediate threat to organizations globally.

February 16, 2022 Alyssa Borelli Leave a Comment

Andrey Popov/stock.adobe.com

In 2021, 14 of the 16 U.S. critical infrastructure sectors were hit with ransomware, according to the CISA, FBI and NSA in a new report. And it’s not just happening the U.S., Australia’s critical infrastructure entities have been hit, as well as in the U.K.

The education sector was one of the top U.K. sectors targeted by ransomware attacks, according to cyber security officials. The U.K. has also seen ransomware attacks targeting businesses, charities, legal profession, public services, government, and the health sector.

Ransomware tactics and techniques are continuing to evolve and place an immediate threat to organizations globally.

Cyber security authorities have noted and rounded up the following behaviors and trends among cybercriminals:

Cyber criminals are increasingly gaining access to networks via phishing, stolen remote desktop protocols (RDP) credentials or brute force, and exploiting vulnerabilities. Phishing emails, RDP exploitation, and exploitation of software vulnerabilities remain the top three initial infection vectors for ransomware incidents in 2021, according to CISA. The increased use of remote work that started in 2020 has attributed to this.

Using cyber criminals for hire. Officials warn that the market for ransomware is becoming increasingly professional. In addition to the increased use of ransomware-as-a-service, ransomware threat actors have set up independent services to negotiate payments with victims, assist victims with making payments, and arbitrate payment disputes between themselves and other cybercriminals.

U.K. officials have also observed ransomware threat actors offering their victims to services of a 24/7 help center to expedite ransom payments and the restoration of encrypted systems or data.

Related: Education Is The Most Targeted For Ransomware

Officials continue to warn to never pay a ransom; it confirms the viability and financial attractiveness of the lucrative criminal business model.

Shift from large organizations to mid-size companies. In the first half of 2021, cyber security authorities in the U.S. and Australia observed ransomware threat actors targeting large organizations (e.g. Colonial Pipeline, JBS foods and Kaseya). The FBI is now observing ransomware threat actors redirecting ransomware efforts away from large organizations to mid-sized victims to reduce scrutiny.

Triple extortion threats. Once threat actors encrypt a victims’ network, they then threaten to publicly release sensitive information or disrupt the victims’ internet access. Lastly, they will threat to inform the victims partners, shareholders or suppliers about the incident.

Ransomware groups have increased their impact by targeting the cloud, targeting managed service providers, attacking industrial processes, and attacking the software supply chain, and targeting organizations on holidays and weekends.

Here’s a short list of actions IT pros can take now to protect against ransomware:

  • Update operating systems and software
  • Implement user training and fishing exercises to raise awareness about their risk of suspicious links and attachments
  • If you use remote desktop protocol, secure, and monitor it
  • Make an offline backup of all data
  • Use multifactor authentication

For more information on mitigations and how to respond to a ransomware attack, read CISA’s Alert (AA22-040A).

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: CISA, cyber crime, ransomware, ransomware as a service

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.