STOCK TITAN

OpenText Cybersecurity Unveils 2024's Nastiest Malware: Ransomware Threats Escalate Against Critical Infrastructure

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Negative)
Tags

OpenText has released its annual 'Nastiest Malware of 2024' report, highlighting escalating ransomware threats targeting critical infrastructure. Organizations are expected to increase cybersecurity investments by 14.3% to $215 billion in 2024. LockBit maintains its position as the top malware threat, with 175 reported attacks on critical infrastructure according to FBI data. The report identifies other significant threats including Akira, RansomHub, Dark Angels, Redline, and Play Ransomware, each targeting different sectors with sophisticated attack methods.

OpenText ha pubblicato il suo rapporto annuale 'Il Malware più Nefasto del 2024', evidenziando l'aumento delle minacce ransomware che mirano alle infrastrutture critiche. Si prevede che le organizzazioni aumenteranno gli investimenti in cybersecurity del 14,3%, raggiungendo i 215 miliardi di dollari nel 2024. LockBit mantiene la sua posizione di principale minaccia malware, con 175 attacchi segnalati contro infrastrutture critiche secondo i dati dell'FBI. Il rapporto identifica altre minacce significative tra cui Akira, RansomHub, Dark Angels, Redline e Play Ransomware, ciascuna mirante a settori diversi con metodi di attacco sofisticati.

OpenText ha lanzado su informe anual 'El Malware más Perverso de 2024', destacando el aumento de las amenazas de ransomware dirigidas a infraestructura crítica. Se espera que las organizaciones incrementen sus inversiones en ciberseguridad en un 14,3%, alcanzando los 215 mil millones de dólares en 2024. LockBit se mantiene como la principal amenaza de malware, con 175 ataques reportados a infraestructura crítica según datos del FBI. El informe identifica otras amenazas significativas como Akira, RansomHub, Dark Angels, Redline y Play Ransomware, cada una dirigidas a diferentes sectores con métodos de ataque sofisticados.

OpenText는 '2024년 가장 악성인 맬웨어' 보고서를 발표하며 중요한 인프라를 겨냥한 랜섬웨어 위협이 증가하고 있음을 강조했습니다. 조직들은 2024년에 사이버 보안 투자를 14.3% 증가시켜 2,150억 달러에 이를 것으로 예상됩니다. LockBit는 FBI 데이터에 따르면 중요한 인프라에 대한 175건의 보고된 공격으로 주요 맬웨어 위협으로 자리매김하고 있습니다. 이 보고서에서는 Akira, RansomHub, Dark Angels, Redline, Play Ransomware와 같은 다른 주요 위협도 식별되며, 각기 다른 산업을 겨냥한 정교한 공격 방법을 사용하고 있습니다.

OpenText a publié son rapport annuel 'Les Malware les Plus Maléfiques de 2024', mettant en évidence la montée des menaces de ransomware ciblant les infrastructures critiques. On s'attend à ce que les organisations augmentent leurs investissements en cybersécurité de 14,3%, atteignant 215 milliards de dollars en 2024. LockBit maintient sa position de principale menace de malware, avec 175 attaques signalées contre des infrastructures critiques selon les données du FBI. Le rapport identifie d'autres menaces significatives telles que Akira, RansomHub, Dark Angels, Redline et Play Ransomware, chacune ciblant différents secteurs avec des méthodes d'attaque sophistiquées.

OpenText hat seinen jährlichen Bericht 'Die gemeinsten Malware des Jahres 2024' veröffentlicht, der die zunehmenden Ransomware-Bedrohungen hervorhebt, die auf kritische Infrastrukturen abzielen. Es wird erwartet, dass die Organisationen die Investitionen in die Cybersicherheit im Jahr 2024 um 14,3% auf 215 Milliarden Dollar erhöhen. LockBit bleibt die größte Malware-Bedrohung, mit 175 gemeldeten Angriffen auf kritische Infrastrukturen laut FBI-Daten. Der Bericht identifiziert weitere bedeutende Bedrohungen, darunter Akira, RansomHub, Dark Angels, Redline und Play Ransomware, die jeweils verschiedene Sektoren mit ausgeklügelten Angriffsmethoden angreifen.

Positive
  • Projected 14.3% increase in cybersecurity investments to $215 billion in 2024
Negative
  • 175 LockBit attacks reported on critical infrastructure
  • Increasing AI-powered personalized threats endangering national security
  • Ransomware attacks on critical infrastructure intensifying

Insights

The 2024 Nastiest Malware report reveals concerning trends in the cybersecurity landscape, particularly the escalating sophistication of ransomware attacks targeting critical infrastructure. The projected $215 billion cybersecurity investment surge, representing a 14.3% increase, reflects the growing severity of these threats.

LockBit's continued dominance, with 175 documented attacks on critical infrastructure, demonstrates the resilience of modern ransomware operations despite law enforcement efforts. The emergence of new players like Akira and RansomHub, coupled with Dark Angels' $75 million ransom achievement, indicates a maturing and increasingly profitable criminal ecosystem.

For OTEX investors, this report positions the company favorably in the expanding cybersecurity market. The detailed threat intelligence and ongoing research demonstrate OpenText's strong market position and expertise in a rapidly growing sector, potentially driving increased demand for their security solutions.

As cyberattacks grow more insidious, organizations are ramping up cybersecurity investments to defend essential services

WATERLOO, ON, Oct. 31, 2024 /PRNewswire/ -- OpenText (NASDAQ: OTEX), (TSX: OTEX), has revealed its highly anticipated "Nastiest Malware of 2024" list, spotlighting the year's most notorious cyber threats. Now in its seventh year, OpenText's cybersecurity experts have identified the most relentless and adaptive malware trends impacting industries worldwide. This year, ransomware aimed at critical infrastructure takes center stage, highlighting an urgent call for reinforced security to protect vital services. In response, organizations are projected to increase their cybersecurity investments by 14.3% in 2024, reaching more than $215 billion.

Once again, ransomware group LockBit secures the #1 spot as the nastiest malware of the year. Known for its resilience and relentless pursuit of critical targets, LockBit has successfully dodged multiple law enforcement crackdowns. According to the FBI's 2023 2023 Internet Crime report, LockBit was reported in 175 attacks on critical infrastructure, underscoring its staying power and adaptability. The ongoing standoff between the FBI and LockBit shows the gritty persistence of today's ransomware market and its growing sophistication. For several months now, the battle for dominance between the FBI and LockBit has highlighted the persistence of the ransomware market and how as technology evolves these threats continually lurk in the shadows.    

"Ransomware attacks on critical infrastructure are on the rise, and cybercriminals are increasingly using artificial intelligence to develop highly personalized threats, which significantly endangers national security and public safety," said Muhi Majzoub, EVP and Chief Product Officer, OpenText. "However, the increased attention on ransomware and cybersecurity is encouraging, as more organizations are proactively prioritizing cybersecurity investments. This commitment highlights their dedication to safeguarding essential services from evolving threats." The 2024 list showcases how adaptive and innovative each ransomware is, but also how well these threats push boundaries. With their malicious capabilities and evasiveness, these cybercriminals continue to find new ways to surpass our darkest expectations.

2024's Nastiest Malware Hall of Infamy:

  1. LockBit: This ransomware-as-a-service (RaaS) heavyweight leads the pack again, unfazed by FBI efforts to take it down. LockBit's aim? Target one million businesses before calling it quits, solidifying its spot as a top ransomware menace in 2024.
  2. Akira: A fresh and ferocious entry, Akira brings a splash of '80s aesthetics to the dark web, quickly climbing the ranks with ruthless encryption tactics and swift deployment. It's especially active in healthcare, manufacturing, and finance, cementing itself as a go-to Ransomware-as-a-Service (RaaS) model for affiliates.
  3. RansomHub: Rumored to be a descendant of the Black Cat (ALPHV) group, RansomHub burst onto the scene targeting high-profile organizations. After attacking Planned Parenthood, this group made headlines by stealing and ransoming sensitive patient data, threatening public exposure.
  4. Dark Angels: Known for its laser-focused, high-impact attacks on top-tier targets, Dark Angels doesn't hold back. Using advanced infiltration methods, they've secured ransom payments as high as $75 million, leaving their mark on one of the year's biggest Fortune 50 attacks.
  5. Redline: Not ransomware but still formidable, Redline Stealer specializes in stealing credentials and sensitive information with skillful evasion tactics, making it a persistent headache across various sectors.
  6. Play Ransomware: Making waves with high-profile attacks, Play Ransomware is as versatile as it is relentless. From targeting public and private sectors to exploiting FortiOS vulnerabilities and RDP servers, this group keeps victims on their toes with ever-evolving techniques.

Want the full rundown? Visit the OpenText Cybersecurity Community, view the infographic, and join us for our "Nastiest Malware Webinar" to dive deeper into this year's findings and stay ahead of emerging threats!

About OpenText Cybersecurity
OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention, detection and response to recovery, investigation and compliance, our unified/end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time and contextual threat intelligence, OpenText Cybersecurity customers benefit from high-efficacy products, compliant experience and simplified security to help manage business risk.

About OpenText
OpenText™ is the leading Information Management software and services company in the world.  We help organizations solve complex global problems with a comprehensive suite of Business Clouds, Business AI, and Business Technology.  For more information about OpenText (NASDAQ/TSX: OTEX), please visit us at www.opentext.com.

Connect with us:

OpenText CEO Mark Barrenechea's blog
Twitter | LinkedIn 

Certain statements in this press release may contain words considered forward-looking statements or information under applicable securities laws. These statements are based on OpenText's current expectations, estimates, forecasts and projections about the operating environment, economies, and markets in which the company operates. These statements are subject to important assumptions, risks and uncertainties that are difficult to predict, and the actual outcome may be materially different. OpenText's assumptions, although considered reasonable by the company at the date of this press release, may prove to be inaccurate and consequently its actual results could differ materially from the expectations set out herein. For additional information with respect to risks and other factors which could occur, see OpenText's Annual Report on Form 10-K, Quarterly Reports on Form 10-Q and other securities filings with the SEC and other securities regulators. Readers are cautioned not to place undue reliance upon any such forward-looking statements, which speak only as of the date made. Unless otherwise required by applicable securities laws, OpenText disclaims any intention or obligations to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise. Further, readers should note that we may announce information using our website, press releases, securities law filings, public conference calls, webcasts and the social media channels identified on the Investors section of our website (https://investors.opentext.com). Such social media channels may include the Company's or our CEO's blog, Twitter account or LinkedIn account. The information posted through such channels may be material. Accordingly, readers should monitor such channels in addition to our other forms of communication.

Copyright © 2024 OpenText. All Rights Reserved. Trademarks owned by OpenText. One or more patents may cover this product(s). For more information, please visit https://www.opentext.com/patents.

OTEX-G

 

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/opentext-cybersecurity-unveils-2024s-nastiest-malware-ransomware-threats-escalate-against-critical-infrastructure-302292325.html

SOURCE Open Text Corporation

FAQ

What is the nastiest malware of 2024 according to OpenText (OTEX)?

According to OpenText's 2024 report, LockBit remains the nastiest malware, responsible for 175 attacks on critical infrastructure as reported by the FBI.

How much will cybersecurity investments increase in 2024 according to OpenText (OTEX)?

Organizations are projected to increase their cybersecurity investments by 14.3% in 2024, reaching more than $215 billion.

What are the top malware threats identified by OpenText (OTEX) in 2024?

The top malware threats identified include LockBit, Akira, RansomHub, Dark Angels, Redline, and Play Ransomware, each targeting different sectors with various attack methods.

Open Text Corp

NASDAQ:OTEX

OTEX Rankings

OTEX Latest News

OTEX Stock Data

7.81B
260.08M
2.1%
78.06%
1.84%
Software - Application
Services-computer Integrated Systems Design
Link
United States of America
ONTARIO CANADA