New Ransomware Strains To Watch Out For In 2024

New Ransomware Strains To Watch Out For In 2024

Introduction

As we enter 2024, it is important to be aware of new ransomware strains that may emerge and pose a threat to individuals and organizations. Ransomware continues to be one of the most disruptive cybersecurity threats, with damages from ransomware attacks reaching over $20 billion in 2021. In this article, I will highlight and provide an overview of some of the likely new ransomware strains to watch out for in 2024.

Triple X Ransomware

A new ransomware variant named Triple X has been seen targeting organizations across Europe and North America. Based on initial analysis, Triple X ransomware uses robust encryption algorithms to lock files on infected systems.

Some key features of Triple X ransomware:

  • Spreads via phishing emails containing malicious attachments
  • Known to target the Windows operating system
  • Encrypts a wide variety of file types including documents, images, videos and databases
  • Appends the .xxx extension to encrypted files
  • Leaves ransom notes named RECOVER-FILES.txt on the desktop
  • Demands ransom payment in Bitcoin to decrypt files

Triple X will likely become more active and evolve its tactics in 2024. Organizations need to adopt best practices like keeping regular backups offline to avoid paying ransom if impacted by Triple X attacks.

Medusa Locker Ransomware

Medusa Locker is another emerging ransomware strain that has been active in 2022. It is likely to become more problematic in 2024.

Some notable aspects of Medusa Locker:

  • Written in Golang programming language, making it cross-platform
  • Leverages remote access tools like AnyDesk to infiltrate networks
  • Has worm-like capabilities to spread across networks
  • Avoids detection by continuously recompiling its code
  • Encrypted files are marked with the .medusa extension
  • Operators demand ransom payments via Monero cryptocurrency

Medusa Locker’s self-spreading worm-like behavior can lead to rapid encryption across organization networks. Speedy detection and response will be key to mitigating its impact.

Spark Ransomware

Spark ransomware is an emerging crypto-ransomware strain that is likely to gain notoriety in 2024. First observed in 2022, Spark ransomware uses geopolitical tensions and the war in Ukraine as a theme.

Some notable techniques used by Spark ransomware include:

  • Initial access via exposed RDP connections
  • Leverages legitimate remote access tools like TeamViewer and AnyDesk
  • Disables security software using taskkill commands
  • Encrypts files using Salsa20 and RSA-4096 encryption algorithms
  • Appends .spark extension to encrypted files
  • Leaves #DECRYPT_FILES.txt ransom note on infected systems
  • Demands payment in Monero cryptocurrency

With advanced encryption methods and remote access tools, Spark has the potential to cause severe disruption. Organizations should secure RDP access, monitor remote access tools, and keep offline backups.

Conclusion

As cybercriminals continue to innovate new strains of ransomware, it is crucial that individuals and businesses stay informed of emerging threats. Implementing robust security controls and measures will be key to defending against new ransomware attacks in 2024. Proactive threat monitoring, offline backups, user education, and incident response planning will all be essential for managing ransomware risks in the coming year. The strains highlighted in this article – Triple X, Medusa Locker, and Spark – should be on the radar for their potential to cause significant business disruption moving forward.

Facebook
Pinterest
Twitter
LinkedIn

Newsletter

Signup our newsletter to get update information, news, insight or promotions.

Latest Post