1. Ransomware as a Service
RaaS used to be the work of a few sophisticated actors. But now it is a robust business, complete with affiliate programs, revenue splits and customer support.
Instead of developing their own infrastructure, code and process, attackers can rely on a third party to do it for them, much like a SaaS product.
“This shift has fundamentally changed the risk equation for enterprises,” says Deepen Desai, chief security officer at Zscaler.
EXPLORE: The anatomy of a phishing attack and how to navigate this security scenario.
He adds that RaaS has removed the barrier to entry and injected speed, scale and volatility into the ransomware ecosystem.
“Defenders are no longer facing a single threat actor but a dynamic supply chain of attackers,” he says.
This sophisticated attack strategy requires that IT leaders adopt a zero-trust mindset. This means shifting from perimeter defense to containment; from trust to continuous verification; and from static controls to adaptive, risk-based security models.
For Frank Dickson, group vice president for security and trust at IDC, defending against RaaS comes down to shoring up five basic areas.
“Focus on your network controls, application controls, identity and permissions, data security, and endpoint security,” he says.