​​Microsoft releases second edition of Cyber Signals 

  • RaaS a superior business model helping criminals deploy ransomware
  • More than 80% of ransomware attacks traced in order to common configuration errors 

​​Microsoft releases second edition of Cyber Signals  Microsoft released the second edition associated with Cyber Signals, a normal cyberthreat intelligence brief, spotlighting security tendencies and insights collected from Microsoft’s worldwide security signals and experts.  

The tech giant noted that will specialisation and loan consolidation of the cybercrime economic climate have fueled ransomware-as-a-service (RaaS), becoming a major business model, thus enabling a wider range of criminals, regardless of their technical expertise, in order to deploy ransomware.  

This said this edition of Cyber Signals provides insights within the evolving factors shaping the extortion section of the cybercrime economy, and the influential rise of RaaS running ransomware attacks.

It additional that the RaaS economy allows cybercriminals to buy access to ransomware payloads and data seapage as well as payment infrastructure.  

These Ransomware ‘gangs’ are in reality RaaS programs like Conti or REvil, utilized by many different actors who also switch between RaaS programs and payloads, Microsoft said.  

This industrialisation of cybercrime has created specialised functions, like access agents who sell entry to networks and a single compromise often entails multiple cybercriminals in various stages of the intrusion, it said.

Key results shared within the document include:

  • Over 80 percent of ransomware assaults can be traced to common configuration mistakes in software and devices;
  • Microsoft’s Digital Crimes Unit directed the removal of more than 531, 500 unique phishing Web addresses and 5, 400 phish kits among July 2021 and June 2022;
  • Median time for an attacker to access a person’s personal data if they fall victim to a phishing email is one hr and 12 minutes;
  • Designed for endpoint threats, the particular median time to have an attacker to begin shifting laterally within a corporate network if a device is compromised any hour and 42 minutes; and
  • Guidance on just how businesses can better pre-empt and affect extortion threats, because they build their credential cleanliness, auditing credential exposure, reducing the assault surface, securing their own cloud resources plus identities, better stopping initial access, plus closing security blind spots.

Vasu Jakkal, business vice president, safety, compliance, identity, and management at Microsoft, said, “The best defenses begin with clearness and prioritisation, this means more sharing info across and between the public and personal sectors and a collective resolve to help each other make the world safer for all.

“At Microsoft, we take that responsibility to heart mainly because we believe security is a team sport, ” said Jakkal.

To learn more on the RaaS landscape and its evolution, browse the Cyber Signals microsite and report , as well as the Microsoft Protection blogpost .

To better understand the cybercrime gig economy and how businesses can secure themselves, visit the Microsoft Security blog .