A recent report by Acronis Research revealed that India accounts for 55% of the victims in recent Makop ransomware operations, making it the most targeted country for this threat. Attackers are exploiting weaker cybersecurity practices and common local antivirus solutions in the region.
Key Findings of the Acronis Report
Primary Entry Point: Most Makop attacks begin by
compromising unsecured Remote Desktop Protocol (RDP) systems, often using
automated tools to guess weak passwords.
Evolving Delivery Method: The ransomware is now being
distributed through Guloader, a type of malware downloader, which helps the
attackers better hide the ransomware from security software.
Bypassing Security: The threat actors use a mix of
off-the-shelf tools, including network scanners, credential stealers (like
Mimikatz), and utilities designed to disable or uninstall security products,
including specific Indian antivirus software like Quick Heal.
Targeting SMBs: The Acronis findings suggest a significant risk for India's Small and Medium Businesses (SMBs) and critical sectors, highlighting a need for improved cybersecurity hygiene.
Acronis researchers found that most Makop attacks begin with
breaking into unsecured Remote Desktop Protocol (RDP) systems. Attackers use
automated tools to guess weak passwords and gain access. After entering, they
follow a simple but effective playbook: scanning the network, stealing login
credentials, moving deeper into systems, disabling security products, and then
finally encrypting data. In many cases, they use known tools like Mimikatz for
credential theft and network scanners to map the environment.
The company recommends that businesses immediately secure all remote access with Multi-Factor Authentication (MFA), apply regular patches, limit public RDP access, and deploy strong endpoint protection capable of detecting loaders like Guloader. Better password practices and regular security audits can also significantly reduce risk.
By - Aaradhay Sharma

No comments:
Post a Comment