{"id":18754,"date":"2021-06-26T00:07:00","date_gmt":"2021-06-26T00:07:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18754"},"modified":"2023-03-20T20:55:24","modified_gmt":"2023-03-20T20:55:24","slug":"ransomware-as-a-service-raas-ttp-protections","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/","title":{"rendered":"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats"},"content":{"rendered":"<p>At first glance, the report this week from cybersecurity software vendor McAfee showing that the incidence of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> dropped by half in the first quarter seems like good news to a world that continues to feel the repercussions of the seemingly ubiquitous <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a>.<\/p>\n<p>However, the 50 percent decline in ransomware during the first three months of 2021 has less to do with cybercriminals finding other modes of stealing data and more because of an evolution away from mass multi-target ransomware attacks that come with low returns to ransomware-as-a-service (RaaS) campaigns that target fewer but larger organizations with more customized ransomware, which in turn deliver more lucrative results.<\/p>\n<p>McAfee researchers addressed the shift in ransomware strategy this week in their <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/mobile\/fortinet-reports-surge-in-mobile-malware\/rp-threats-jun-2021.pdf\" target=\"_blank\" rel=\"noopener\">McAfee Threats Report: June 2021<\/a>. In the report, the researchers also talked about how the proliferation of 64-bit CoinMiner applications fueled the 117 percent growth in <a href=\"https:\/\/www.esecurityplanet.com\/networks\/what-is-cryptojacking-and-why-is-it-a-cybersecurity-risk\/\">cryptocurrency-generating coin mining malware<\/a> as well as an increase in new Mirai-based malware variants that helped drive a 55 percent jump in malware targeting <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/the-iot-cybersecurity-act-of-2020-implications-for-devices\/\">Internet of Things (IoT) devices<\/a> and a 38 percent increase in attacks on Linux systems.<\/p>\n<h2>Ransomware is the Focus<\/h2>\n<p>But as it is with much in the cybersecurity world, there was a focus on ransomware in the report. According to Raj Samani, McAfee Fellow and chief scientist, cybercriminals are constantly evolving their techniques in order to get the highest monetary returns with the least amount of risk. The transition in ransomware has been away from trying to extract small payments from millions of individual targets to RaaS campaigns that support many more bad actors in attacks on fewer but larger organizations and extorting them for more money.<\/p>\n<p>While 2021 has been noteworthy for headline-grabbing ransomware attacks like the one on <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">Colonial Pipeline<\/a>, the trend toward bigger targets had been underway before then, Samani told <em>eSecurity Planet<\/em> in an email interview.<\/p>\n<p>\u201cThis is a number of years old,\u201d he said. \u201cWe saw from 2018 Ryuk began targeting organizations, but preceding this was GandCrab and SamSam.\u00a0It was really GandCrab that embraced the RaaS model. Likewise, circa 2019\/2020, we saw the introduction of leak sites. Ultimately, many of these groups copy the approaches from other groups that are proving successful.\u201d<\/p>\n<h2>Leak Sites<\/h2>\n<p>Leak sites are part another relatively new tactic for ransomware groups looking to put more pressure on organizations to pay the ransom. Cybercriminals typically would grab hold of a victim\u2019s data, encrypt it and then demand payment, with the promise \u2013 not always fulfilled \u2013 that once the ransom was paid, they would send a key to the victims to decrypt the data.<\/p>\n<p>However, bad actors now tend to put another spin on their methods. They will steal data from their victims before encrypting it and threaten to publish the stolen data on the \u201cleak sites\u201d and then alert the media about the attack. The names of the dozens of groups that threaten to leak data include MAZE, AKO, REvil, DarkSide, Ranzy Locker and Ragnarok.<\/p>\n<p>DarkSide in particular has a high profile these days. Most researchers say the Russia-based group was behind the ransomware attack on Colonial Pipeline, a company responsible for much of the gas distribution in the Southeastern United States. The company had to shut down some of its operations, which led to shortages and long lines at gas stations throughout the region. Colonial eventually paid almost $5 million (75 Bitcoins) to the attackers for the decryption key, which turned out to decrypt so slowly that the company <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\">had to rely on its own backups<\/a> to restore service.<\/p>\n<p>According to reports, the group had also stolen about 100 gigabytes of data from Colonial servers before the onset of the malware attack.<\/p>\n<h2>Ransomware Subject of High-Level Talks<\/h2>\n<p>In their report, McAfee researchers noted that ransomware in general \u2013 and DarkSide in particular \u2013 \u201cresulted in an agenda item in talks between U.S. President Biden and Russian President Putin. While we have no intention of detailing the political landscape, we certainly do have to acknowledge that this is a threat disrupting our critical services. Furthermore, adversaries are supported within an environment that make digital investigations challenging with legal barriers that make the gathering of digital evidence almost impossible from certain geographies.\u201d<\/p>\n<p><strong>Further reading<\/strong>: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/cisa-fbi-colonial-pipeline-ransomware\/\">U.S. Issues Ransomware Guidance, Cybersecurity Executive Order<\/a><\/p>\n<p>The McAfee researchers also wrote that while the Colonial Pipeline attack got a lot of the headlines, attacks ransomware groups Babuk, Conti, Ryuk and REvil preceded DarkSide\u2019s campaign, with RaaS schemes that targeted larger organizations, most of whom were hit with custom-created variants of a ransomware family. REvil \u2013 which federal law enforcement said was behind the recent attack on JBS Foods \u2013 was the most detected ransomware group in the first quarter, according to the McAfee report.<\/p>\n<p>RaaS affiliate networks enable bad actors to reduce the risk of large organizations\u2019 cyber-protection technologies detecting them, which in turn improves the chances of the attacks working and the ransom being paid. Campaigns that use a single type of ransomware to target many victims tend to be \u201cnoisy,\u201d which leads to systems eventually beginning to recognize and block them.<\/p>\n<h2>Shift to RaaS<\/h2>\n<p>This ongoing shift to RaaS also can be seen in the decrease in prominent <a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-types-of-ransomware\/\">ransomware types<\/a>, from 19 in January to nine by March.<\/p>\n<p>Such RaaS efforts shows that cybersecurity researchers and the IT world as a whole should be looking more at the impact of ransomware attacks rather than the volume, McAfee\u2019s Samani said.<\/p>\n<p>\u201cWhilst the volume of ransomware families may not be at the same prevalence as before, those groups that still remain in operation are finding more innovative approaches to compromise and extort higher payments,\u201d Samani said.<\/p>\n<h2>Feds Step Up Response<\/h2>\n<p>The federal government has become <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/white-house-says-take-ransomware-threat-seriously\/\">increasingly involved<\/a> in pushing back against cybercrime, particularly ransomware. The Department of Homeland Security (DHS) for a couple of years has urged ransomware victims not to pay the ransoms, fearing that the money would help fund even more attacks. In addition, the National Security Council earlier this month sent a memo to U.S. companies urging them to take the threat seriously and outlining steps they can take to protect themselves.<\/p>\n<p>In addition, the U.S. Cybersecurity and Infrastructure Agency (CISA) and FBI issued an alert with<a href=\"https:\/\/www.esecurityplanet.com\/networks\/cisa-fbi-colonial-pipeline-ransomware\/\">\u00a0guidance<\/a> based on the MITRE ATT&amp;CK framework for protecting critical and the Biden Administration issued an\u00a0<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">executive order<\/a>\u00a0to review and improve the federal government\u2019s cybersecurity preparedness and response. DHS issued <a href=\"https:\/\/www.dhs.gov\/trends\/\/2021\/05\/27\/dhs-announces-new-cybersecurity-requirements-critical-pipeline-owners-and-operators\" target=\"_blank\" rel=\"noopener\">cybersecurity requirements<\/a>\u00a0for critical pipeline owners and operators.<\/p>\n<h2>Ransomware Isn\u2019t Going Anywhere<\/h2>\n<p>Rita Gurevich, founder and CEO of cybersecurity firm Sphere, said businesses can expect ransomware attacks to continue, noting another change in strategy.<\/p>\n<p>\u201cA few years ago, ransomware was primarily focused on targeting consumers, but recently we have seen the switch to the more lucrative corporate arena,\u201d Gurevich told <em>eSecurity Planet<\/em>, reacting to news of new REvil attacks on clothing firm French Connection and medical diagnostic company Grupo Fluery. \u201cThese attacks have become more sophisticated, transitioning from the known phishing strategy using a bulk email approach to a spear-phishing strategy, which are highly targeted, harder to detect and have a much higher success rate. The ease of which ransomware can be conducted is also an issue as ransomware software can easily be purchased on the darknet.\u201d<\/p>\n<p>She also noted that \u201crecent actions by the federal government and corporate initiatives have changed the narrative from one of response to prevention of ransomware attacks. The focus for IT and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">security<\/a> professionals is now on ensuring backups are in place, increasing training for users and [leveraging] an effective access governance model. IT and security professionals also need to adapt to their new environment where the skillset they successfully employed a few years ago may not suffice against the sophisticated ransomware attacks of today.\u201d<\/p>\n<p>While the rise of RaaS is the primary driver for the drop in overall ransomware instances in the first quarter, it\u2019s not the only one, according to Samani.<\/p>\n<p>\u201cWe see that trend in cybercrime almost every year after Christmas and holidays,\u201d he said. \u201cThere is a post-holiday slowdown, then the first quarter shows a ramp up, then a dip during summer as cybercriminals need a vacation, too. Then we see a ramp up again towards the end of the year, perhaps as criminals need money to buy Christmas gifts.\u201d<\/p>\n<h2>Top Ransomware TTPs and Defensive Steps to Take<\/h2>\n<p>Adversary emulation vendor Scythe this week released a report on the top ransomware tactics, techniques and procedures (TTPs). Below is a table of the MITRE ATT&amp;CK TTPs followed by protection steps recommended by Scythe.<\/p>\n<div align=\"left\">\n<table>\n<colgroup>\n<col style=\"width: 113px;\" \/>\n<col style=\"width: 389px;\" \/><\/colgroup>\n<tbody>\n<tr style=\"height: 34pt;\">\n<td colspan=\"2\">&nbsp;<\/p>\n<p><strong>Top 10 ransomware TTPs or behaviors used by Conti, DarkSide, Egregor, Ryuk, and Maze ransomware<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 22.75pt;\">\n<td>Initial Access<\/td>\n<td>T1078 &#8211; Valid Accounts<\/td>\n<\/tr>\n<tr style=\"height: 22.75pt;\">\n<td>Execution<\/td>\n<td>T1059.001 &#8211; PowerShell<\/td>\n<\/tr>\n<tr style=\"height: 34pt;\">\n<td>Command and Control<\/td>\n<td>T1071 &#8211; Application Layer Protocol and T1573 &#8211; Encrypted Channel (HTTPS)<\/td>\n<\/tr>\n<tr style=\"height: 34pt;\">\n<td>Discovery<\/td>\n<td>T1082 &#8211; System Information Discovery<\/p>\n<p>T1057 &#8211; Process Discovery<\/td>\n<\/tr>\n<tr style=\"height: 34pt;\">\n<td>Privilege Escalation<\/td>\n<td>T1053.005 &#8211; Scheduled Task\/Job: Scheduled Task<\/td>\n<\/tr>\n<tr style=\"height: 34pt;\">\n<td>Collection<\/td>\n<td>T1074.001 &#8211; Data Staged: Local Data Staging<\/p>\n<p>T1560 &#8211; Archive Collected Data<\/td>\n<\/tr>\n<tr style=\"height: 22.75pt;\">\n<td>Exfiltration<\/td>\n<td>T1041 &#8211; Exfiltration Over C2 Channel (HTTPS)<\/td>\n<\/tr>\n<tr style=\"height: 22.75pt;\">\n<td>Impact<\/td>\n<td>T1486 &#8211; Data Encrypted for Impact<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<h3>\u200dScythe&#8217;s 10 ransomware recommendations<\/h3>\n<ul>\n<li role=\"presentation\">Enable <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication<\/a> on all user accounts (Internet first and then internally), especially anywhere requiring privilege access as valid accounts is the main method of initial access.<\/li>\n<li role=\"presentation\">Detect and alert on execution of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\">PowerShell<\/a>, which is the top execution method discovered by ransomware. Tuning will be required to lower the quantity of events due to solutions that leverage PowerShell.<\/li>\n<li role=\"presentation\">Implement <a href=\"https:\/\/www.esecurityplanet.com\/products\/casb-security-vendors\/\">a proxy for outbound Internet traffic<\/a>, as HTTPS is the top command and control technique.<\/li>\n<li role=\"presentation\">Detect and alert on systems that continually call out to a particular domain, as this is behavior of command and control traffic.<\/li>\n<li role=\"presentation\">Monitor the amount of traffic going outbound to detect exfiltration.<\/li>\n<li role=\"presentation\">Detect and alert when new scheduled tasks are created.<\/li>\n<li role=\"presentation\">Establish and test backup and recovery from offline sources.<\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6f2c1d970a-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f2c1d970a\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f2c1d970a\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f2c1d970a\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f2c1d970a\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f2c1d970a\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f2c1d970a\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>At first glance, the report this week from cybersecurity software vendor McAfee showing that the incidence of ransomware dropped by half in the first quarter seems like good news to a world that continues to feel the repercussions of the seemingly ubiquitous malware. However, the 50 percent decline in ransomware during the first three months [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18636,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-18754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Ransomware attacks are growing in sophistication, with bigger targets and higher costs. Read more on RaaS, TTPs and protections.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are growing in sophistication, with bigger targets and higher costs. Read more on RaaS, TTPs and protections.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-26T00:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-20T20:55:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"570\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats\",\"datePublished\":\"2021-06-26T00:07:00+00:00\",\"dateModified\":\"2023-03-20T20:55:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\"},\"wordCount\":1635,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\",\"name\":\"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg\",\"datePublished\":\"2021-06-26T00:07:00+00:00\",\"dateModified\":\"2023-03-20T20:55:24+00:00\",\"description\":\"Ransomware attacks are growing in sophistication, with bigger targets and higher costs. Read more on RaaS, TTPs and protections.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg\",\"width\":1280,\"height\":570,\"caption\":\"ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats | eSecurity Planet","description":"Ransomware attacks are growing in sophistication, with bigger targets and higher costs. Read more on RaaS, TTPs and protections.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats | eSecurity Planet","og_description":"Ransomware attacks are growing in sophistication, with bigger targets and higher costs. Read more on RaaS, TTPs and protections.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/","og_site_name":"eSecurity Planet","article_published_time":"2021-06-26T00:07:00+00:00","article_modified_time":"2023-03-20T20:55:24+00:00","og_image":[{"width":1280,"height":570,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats","datePublished":"2021-06-26T00:07:00+00:00","dateModified":"2023-03-20T20:55:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/"},"wordCount":1635,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg","keywords":["ransomware"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/","url":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/","name":"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg","datePublished":"2021-06-26T00:07:00+00:00","dateModified":"2023-03-20T20:55:24+00:00","description":"Ransomware attacks are growing in sophistication, with bigger targets and higher costs. Read more on RaaS, TTPs and protections.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/crime-1862312_1280.jpg","width":1280,"height":570,"caption":"ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware-as-a-Service (RaaS) Is the Latest Evolution in Ransomware Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18754"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18754"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18754\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18636"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18754"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18754"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18754"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}