Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis.

Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last few years, the average time to complete a ransomware attack dropped 94% (from 2019 to 2021). In 2019, the average ransomware attack took over two months from initial access to ransomware deployment. Today it takes less than four days to execute an attack.

The X-Force Definitive Guide to Ransomware can help.

Threat actors continue to adjust their tactics, techniques, and procedures to evade detection. To stay ahead, we refresh the Guide annually to include the latest ransomware research, trends, and attack types. Originally developed by my colleague Limor Kessem in 2017 — who pulled me in as a coauthor — the guide was intended to be a point-in-time document to address the surge in ransomware across geographies and industries.

A bit unexpectedly, the Guide rapidly became one of the hottest publications we do here at X-Force, garnering tens of thousands of downloads and generating a lot of conversation on social media (and several of you have asked how it got started — hence the history lesson!). With that, we’ve refreshed it annually with current data on the evolution of ransomware, types of ransomware attacks — including double-and-triple extortion, and details on each phase of incident response.

Download the Guide

What’s New in the 2023 Definitive Guide to Ransomware

This year, we’ve pulled a handful of other X-Force brainiacs into the author mix — including some of our industry-leading intelligence and research experts — to make the Guide an even more robust and powerful tool in the quest to stay safer from ransomware.

In this year’s edition you’ll find:

  • The X-Force exclusive 5-stage ransomware attack framework, developed from real-life engagements combatting the threat
  • Fortified background on ransomware’s evolution in 2023
  • How to find X-Force proprietary research uncovering robust detection techniques that can help you discover and prevent ransomware on your network

Join the Definitive Guide to Ransomware Webcast

If you have questions and want a deeper discussion about ransomware prevention, detection, and response techniques join us for an interactive webcast on Top 5 Takeaways from the 2023 Definitive Guide to Ransomware Wednesday, June 21, at 11 a.m. EDT.

You can also learn how IBM X-Force can help you with incident response, threat intelligence, or offensive security services by scheduling a follow-up meeting here: IBM X-Force Scheduler.

If you are experiencing cybersecurity issues or an incident, contact X-Force to help: US hotline 1-888-241-9812 | Global hotline (+001) 312-212-8034.

Learn more about how to protect your organization with the new Definitive Guide to Ransomware.

More from Malware

ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)

7 min read - In late April 2023, IBM Security X-Force uncovered documents that are most likely part of a phishing campaign mimicking credible senders, orchestrated by a group X-Force refers to as ITG10, and aimed at delivering RokRAT malware, similar to what has been observed by others. ITG10's tactics, techniques and procedures (TTPs) overlap with APT37 and ScarCruft. The initial delivery method is conducted via a LNK file, which drops two Windows shortcut files containing obfuscated PowerShell scripts in charge of downloading a…

7 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Ex-Conti and FIN7 Actors Collaborate with New Backdoor

15 min read -   April 27, 2023 Update This article is being republished with modifications from the original that was published on April 14, 2023, to change the name of the family of malware from Domino to Minodo. This is being done to avoid any possible confusion with the HCL Domino brand. The family of malware that is described in this article is unrelated to, does not impact, nor uses HCL Domino or any of its components in any way. The malware is…

15 min read

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

7 min read - In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

7 min read