Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Surge in Ransomware Activity Reported in Q2

A report from security firm Digital Shadows indicates that ransomware activity increased by 21% since Q1

by Guru Writer
July 14, 2022
in Cyber Bites
Pirate Flag with red background on a laptop
Share on FacebookShare on Twitter

A 2022 report by the security firm Digital Shadows analyzed 90 data leak sites on the dark web and found that there were a 705 victims in Q2.

This is a 21% increase compared to Q1 where the firm found 582 victims on the same sites.

The leading ransomware group was Lockbit, utilizing the new ransomware operation Lockbit 3.0, which they claim is the “world’s fastest and most stable ransomware”.

Lockbit overtook the infamous Conti group, a Russian-based ransomware group which saw a significant decrease in operations after internal chat logs were released giving valuable information information security experts.

Lockbit had an estimated 230 victims meaning it accounted for almost a third of all postings to leak sites in Q2.

Industrial goods and services was by far the hardest hit sector in Q2, accounting for almost a fifth of all attacks at 18.4%. Technology cane second, at 8.7%, followed by construction (7.9%), healthcare (6.4%), and government (5.5%).

The US was the most targeted region, accounting for almost 40% of all incidents. Germany and the UK followed in second and third place.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Microsoft Patches Zero-Day Bug That Allowed Remote Execution on Windows Machines

Next Post

$8million Worth of Ethereum Stolen in Large Scale Uniswap Phishing Campaign

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information