Analyzing 2024 USA Industry Cyberattack Trends: SecureClaw's Blueprint for Cybersecurity in the New Year

January 03, 2025 04:15 PM AEDT | By EIN Presswire
 Analyzing 2024 USA Industry Cyberattack Trends: SecureClaw's Blueprint for Cybersecurity in the New Year
Image source: EIN Presswire
LOS ANGELES, CA, UNITED STATES, January 3, 2025 /EINPresswire.com/ -- SecureClaw’s Cyber Threat Advisory team has studied more than 5000 cyber-attack news stories worldwide in the year 2024, and here is a snapshot of its annual report. These diagrams showing analysis of USA's industry-targeted cyberattack trends were observed through various media sources and research articles. Few were directly from USA, whereas few sources were generic about entire world, not specific to a particular region. In the United States, under the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA), covered entities must report cyber incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours. Additionally, ransom payments must be reported within 24 hours. For healthcare organizations in the USA, under the Health Insurance Portability and Accountability Act (HIPAA), healthcare entities must report breaches involving personal health information within 60 days. For the banking sector of the USA, the Federal Deposit Insurance Corporation (FDIC) requires banking organizations to report significant cyber incidents within 36 hours. Hence, it is assumed that maximum cyberattack incidents are reported by USA-based organizations to respective entities.

There are two cyber threat terms mostly visible in many cyber-attack news, one is “Malware” and another one is “Ransomware”.
Malware is malicious software designed to harm computer, server, client, OT, IoT, or network confidentiality. Common types include viruses, worms, trojans, ransomware, spyware, adware, and rootkits. As evident in diagram, DarkGate Malware, Hamster Kombat Malware, k4spreader Malware, Nova Snake Malware, Perfctl Malware, SharpRhino Malware, Stuxnet-Like PLC Malware, SystemBC Malware, TheMoon Malware, Web-Based PLC Malware, and Mirai Botnet are various types of malwares that can compromise systems, steal credentials, and evade detection. These malwares use sophisticated techniques to steal credentials and log keystrokes, exploit misconfigurations to install rootkits and mine cryptocurrency, and can be used in ransomware campaigns. They also target routers, IoT devices, web applications, and IoT devices for large-scale DDoS attacks. cShell DDoS Malware targets poorly managed Linux SSH servers, exploiting weak credentials and using Linux tools for DDoS attacks. HiatusRAT Malware targets IoT devices, targeting vulnerabilities in Chinese-branded devices like Hikvision and Xiongmai.

Ransomware attacks initially focused on encrypting victim systems or data and demanding ransom for the decryption key. However, gangs have since evolved to include double and triple extortion techniques. Double extortion involves encrypting data and taking a backup before encryption, threatening to leak it online. Hence, only having a backup ready to restore doesn't help the victim. In triple extortion, attackers use stolen data to target customers or business partners through DDoS attacks. Ransomware attacks can be costly, with average costs reaching millions of dollars, and pose a significant threat due to their speed and difficulty in tracing attackers.

As shown in diagram, the list of ransomware groups found or suspected to be active in the USA includes 3AM, Abyss, APT73, Avos Locker, Black Basta, Blackcat, ALPHV, BlackSuit, Cactus, Daixin, Darkvault, DragonForce, ElDorado, Fortibitch, Hunters, KillSec, LockBit, Lynx, Mallox, PlayCrypt, Qilin (Agenda), RansomHub, ShrinkLocker, Money Message, and NotLockBit. Each group uses different tactics, such as encrypting files, renaming them, and wiping Volume Shadow Copies. Abyss uses double extortion tactics, targeting VMware ESXi instances and threatening to leak stolen data if the ransom isn't paid. AvosLocker operates as a Ransomware-as-a-Service (RaaS) and targets various sectors, including financial services and critical infrastructure. Black Basta is known for its double extortion attacks, targeting healthcare and critical infrastructure. Blackcat uses double and triple extortion tactics, targeting multiple devices and operating systems. ALPHV targets Windows and Linux devices, employing advanced evasion techniques. BlackSuit conducts data exfiltration and extortion before encryption, targeting various critical infrastructure sectors. Cactus targets large commercial organizations by exploiting VPN vulnerabilities. Daixin targets healthcare and encrypts critical servers, threatening to release sensitive data if the ransom isn't paid. Darkvault uses leaked LockBit and Conti ransomware builders, while ElDorado targets Windows and Linux systems. KillSec uses a RaaS model and exploits publicly leaked data for extortion.

According to Dr. Shekhar Ashok Pawar, founder of SecureClaw, there are below key areas which needs attention towards cybersecurity adoption.
(1) Cyber-attacks can cause significant damage to an organization's reputation, trust, and share market price.
(2) Organizations can lose their productive time while undergoing cyber-attacks.
(3) Cybercriminals may sell an organization’s intellectual property (IP), such as source code, or technical designs on the dark web.
(4) The American Data Privacy and Protection Act (ADPPA) is a proposed federal bill in the United States aimed at regulating how organizations handle consumer data. The Federal Trade Commission (FTC) would enforce the ADPPA and could impose civil penalties for non-compliance. These penalties can be substantial, potentially reaching millions of dollars depending on the severity and nature of the violation. There is also the California Privacy Rights Act (CPRA), which applies to businesses with annual gross revenues over $25 million, those that buy, receive, or sell the personal information of 100,000 or more consumers, or derive 50% or more of their annual revenues from selling consumers' personal information. Cybersecurity controls implementation can help protect sensitive data.
(5) Big organizations outsource their operations or a few areas to other small and medium enterprises (SMEs), but it is important to check those are cyber-secured.

Generally, SMEs are facing several challenges while adopting existing cybersecurity standards or frameworks. It includes less funding, a lack of cybersecurity knowledge, and available cybersecurity standards that are not specific to their business's domain requirements, making it less attractive for return on investment. In that case, SecureClaw is providing the Business Domain Specific Least Cybersecurity Controls Implementation (BDSLCCI) cybersecurity framework, providing tailored cybersecurity controls depending on the organization's domain's specific needs. BDSLCCI is very helpful for SMEs, startups, or any such kind of organizations, as it is very cost-effective, less time consuming while implementation, and provides cybersecurity for your business’s mission critical assets. It provides good return on investment (RoI) justifying cybersecurity for sustaining and growing business success.

Apart from BDSLCCI Cybersecurity Framework for SME kind of organizations, SecureClaw provides various services, including Vulnerability Assessment and Penetration Testing (VAPT), Virtual Chief Information Security Officer (Virtual-CISO), and Source Code Security Review (SAST) services.

Dr. Shekhar Pawar
SecureClaw Inc.
+1 218-718-2121
email us here
Visit us on social media:
Facebook
X
LinkedIn
Instagram
YouTube
Other

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.


Disclaimer

The content, including but not limited to any articles, news, quotes, information, data, text, reports, ratings, opinions, images, photos, graphics, graphs, charts, animations and video (Content) is a service of Kalkine Media Pty Ltd (“Kalkine Media, we or us”), ACN 629 651 672 and is available for personal and non-commercial use only. The principal purpose of the Content is to educate and inform. The Content does not contain or imply any recommendation or opinion intended to influence your financial decisions and must not be relied upon by you as such. Some of the Content on this website may be sponsored/non-sponsored, as applicable, but is NOT a solicitation or recommendation to buy, sell or hold the stocks of the company(s) or engage in any investment activity under discussion. Kalkine Media is neither licensed nor qualified to provide investment advice through this platform. Users should make their own enquiries about any investments and Kalkine Media strongly suggests the users to seek advice from a financial adviser, stockbroker or other professional (including taxation and legal advice), as necessary.
The content published on Kalkine Media also includes feeds sourced from third-party providers. Kalkine does not assert any ownership rights over the content provided by these third-party sources. The inclusion of such feeds on the Website is for informational purposes only. Kalkine does not guarantee the accuracy, completeness, or reliability of the content obtained from third-party feeds. Furthermore, Kalkine Media shall not be held liable for any errors, omissions, or inaccuracies in the content obtained from third-party feeds, nor for any damages or losses arising from the use of such content.
Kalkine Media hereby disclaims any and all the liabilities to any user for any direct, indirect, implied, punitive, special, incidental or other consequential damages arising from any use of the Content on this website, which is provided without warranties. The views expressed in the Content by the guests, if any, are their own and do not necessarily represent the views or opinions of Kalkine Media. Some of the images/music that may be used on this website are copyrighted to their respective owner(s). Kalkine Media does not claim ownership of any of the pictures displayed/music used on this website unless stated otherwise. The images/music that may be used on this website are taken from various sources on the internet, including paid subscriptions or are believed to be in public domain. We have made reasonable efforts to accredit the source wherever it was indicated as or found to be necessary.
This disclaimer is subject to change without notice. Users are advised to review this disclaimer periodically for any updates or modifications.


AU_advertise

Advertise your brand on Kalkine Media

Sponsored Articles


Investing Ideas

Previous Next
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.