Nuspire, a Michigan-based managed security services provider (MSSP), has released its 2021 Q2 Quarterly Threat Landscape Report showing a 55,239% increase in ransomware activity just a few weeks prior to the Colonial Pipeline Ransomware attack. The reason for the increase is not known and may, or may not, be related to the Colonial Pipeline incident.
“This quarter, and even this year, we experienced some of the most significant and disruptive ransomware attacks our industry has ever seen,” said Nuspire Chief Security Officer J.R. Cunningham. “The sophistication of these attacks, and the scope of what’s being attacked just shows that ransomware isn’t going anywhere. Ransomware groups continue to become more sophisticated in their attack methods, which is why organizations need to ensure they have the proper controls in place.”
Other notable findings include a 42% increase in malware activity, a 50% reduction in botnet activity and exploit activity since Q1.
Nuspire’s Threat Report provides data and insight into malware, exploit and botnet activity throughout Q2 of 2021.The data was sourced from 90 billion traffic logs measuring cybercriminal activity and tactics, techniques, and procedures.
Ransomware attacks are becoming more common and more damaging, and frequently target critical services like hospitals or energy providers, which tend to pay the ransoms more quickly.