How Ransomware's Industrialization Impacts SOC Operational Tempo

promotion


How Ransomware's Industrialization Impacts SOC Operational Tempo


One way we can better prepare for the future of ransomware is to examine its past. From the late 1980s (when the first ransomware attack was carried out via floppy disk) through the early 2010s, ransomware remained a largely fringe (and unprofitable) activity. As cryptocurrencies like Bitcoin made anonymous, cross-border payments easier to facilitate, it was only a matter of time before modern ransomware emerged.

While CryptoLocker’s meteoric rise, delivered via the Gameover Zeus banking trojan botnet, only lasted for a few months in 2013, it served as a sign of things to come.

From there, we were off to the races. Every major innovation in internet technology and consumer behavior, from the rise of smartphones and cryptocurrency to remote work, has been leveraged by increasingly capable ransomware actors to further their mission. Infamous attacks like WannaCry and Notpetya in 2017 and the 2021 Colonial Pipeline attack have demonstrated the impact that big game ransomware can have. The billions extorted from businesses have fueled a robust cybercriminal ecosystem.

We now find ourselves witnessing the ‘industrialization’ of ransomware. Today, well-funded groups like LockBit have customer support teams, affiliate networks, and a robust “supply chain” of initial access brokers and malware distributors. 

Perhaps most important to security leaders is the fact that the new crop of ransomware attackers are very loud, and very quick.

It’s in the interest of many ransomware organizations to publicize successful attacks to accelerate ransom payments. Leak sites, proof of attack documents, and update boards listing the enterprises they have compromised have become the norm among major ransomware organizations. 

Meanwhile, CISA reported a record number of zero-day exploits in 2023, and initial data shows that things didn’t slow down in 2024. The rise of “living off the land” exploits–finding ways to leverage legitimate software implemented by businesses for malicious intent–has further accelerated the speed and efficiency of attacks: Mandiant has found that ransomware attackers now need three to five days within a system to achieve their objectives - less than half the time of other types of attacks.

There’s an old military adage that if your adversary can respond quicker than you, they’ll win. One key to combating modern ransomware attacks is focusing on operational tempo - the speed at which operations within security are conducted. It doesn’t just pertain to the threat response, but also to the ability to adjust to changes in circumstance, decision-making processes, and resource management. 

A major pillar of maintaining an effective operational tempo is investing in the right technology, and this is where we’re seeing a sea change within security. The past ten years have been largely defined by platform approaches to security IT investments, eschewing best-in-breed point solutions for one-size-fits-all technologies. For many reasons, this made sense: Historically, more tools meant more potential security vulnerabilities, and in terms of resource and financial investments, it was often economically sound to oversee fewer larger technologies than attempting to patch together many smaller ones.

But ransomware “publicity campaigns” (for lack of a better term) have poked major holes in this approach. In fact, perhaps no set of stakeholders in the cybersecurity ecosystem have more to lose in the rise of loud ransomware players than legacy security tech platforms. Due to their desire to publicize and disclose attacks, ransomware organizations are exposing those that have long been seen as leaders in the technology space. Major tech suppliers are coming under increased scrutiny for their inability to secure mission-critical network edge devices against compromise and provide patches promptly. 

We’re now seeing a turn back towards a best-of-breed approach. VC funding of cybersecurity startups jumped 43% in 2024, totaling $11.6 billion. These tools are more modern and often overseen by smaller, more agile teams involved in ensuring the most stringent security protocols within the software.

But even if point solutions are more secure in a vacuum, there’s still the issue of interoperability and opening up vulnerabilities through multi-tool integrations. There has been rapid progress made on this front too. Recent innovations in workflow orchestration and AI make this kind of transformation possible, ensuring that organizations can seamlessly integrate tech stacks that are much more agile and equally or more powerful and cost-efficient as these platforms, while offering higher levels of customization and better security by design. 

We’re just at the beginning of this sea change, but it has the potential to be one of the defining trends in how large enterprises approach security IT investments. In the short term, CISOs must be stringent in vetting their technology vendors, especially long-standing partners.

They also need to ensure they’re approaching their technology strategy with operational tempo in mind. And now, in the "industrialization of ransomware” era, that may mean prioritizing strong, powerful integrations and workflows over any perceived efficiencies that come via large-scale platforms. 

Matt Muller is Field CISO at Tines

You Might Also Read: 

Security Performance Metrics Fall Short:



 

« The Impact Of The Internet On Modern Society [extract]
Failure Happens, But Recovery Can Be Managed Intelligently »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Aurascape AI

Aurascape AI

Aurascape is working on advanced cybersecurity solutions powered by grounds-up generative AI architecture.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.

DRTConfidence

DRTConfidence

DRTConfidence is the proven solution for today’s organizations needing to meet rigorous compliance standards across the enterprise.