CrowdStrike’s Annual Threat Report Reveals Uptick Around Ransomware and Disruptive Operations; Exposes Evolution of eCrime Ecosystem
The landmark CrowdStrike Intelligence report documents both the continued evolution of nation-state affiliated and criminal adversaries, as well as the increased sophistication, velocity and impact of targeted ransomware, disruptive operations and cloud-related attacks in 2021.
- The landmark CrowdStrike Intelligence report documents both the continued evolution of nation-state affiliated and criminal adversaries, as well as the increased sophistication, velocity and impact of targeted ransomware, disruptive operations and cloud-related attacks in 2021.
- Notable adversary updates include:
Financially motivated eCrime activity continues to dominate the interactive intrusion attempts tracked by CrowdStrike OverWatch. - Iran-based adversaries adopt the use of ransomware as well as lock-and-leak disruptive information operations using ransomware to encrypt target networks and subsequently leak victim information via actor-controlled personas or entities.
- eCrime actors including affiliates of DOPPEL SPIDER and WIZARD SPIDER adopted Log4Shell as an access vector to enable ransomware operations.