Ransomware continued to be a mainstay cyber threat last year, according to Trend Micro’s 2019 security roundup report.

The report details details the most important issues and changes in the threat landscape to provide businesses with insights into best practices and strategies for protecting their infrastructures from current and emerging threats.

Overall, Trend Micro discovered a 10% increase in ransomware detections, despite a 57% decrease in the number of new ransomware families. The healthcare sector remained the most targeted industry, with more than 700 providers affected in 2019. Additionally, at least 110 US state and municipal governments and agencies fell victim to ransomware.

“Digital transformation has been a business buzzword for decades, and the concept has yielded very positive results over time. But security is often an afterthought, which leaves digital doors wide open for cybercriminals,” says Jon Clay, director of global threat communications for Trend Micro.

“A lack of basic security hygiene, legacy systems with outdated operating systems and unpatched vulnerabilities are still a reality.”

Emmanuel Tzingakis, tech lead for Trend Micro Sub Saharan Africa adds: “This scenario is ideal for ransomware actors looking for a quick return on investment. As long as the ransom scheme continues to be profitable, criminals will continue to leverage it.”

To improve the ransomware business process, alliances between ransomware groups were formed in 2019. For example, the Sodinokibi ransomware operators launched coordinated attacks on 22 local government units in Texas, demanding a combined $2,5-million ransom.

This attack also demonstrated the “access-as-a-service” trend, in which criminal groups rent out or sell access to company networks. This service ranges in price from $3 000 to $20 000, with the most expensive offering including full access to a company’s server hosts and corporate virtual private networks (VPNs).

Known vulnerabilities remain key to successful cyber attacks, including ransomware.

In 2019, Trend Micro’s Zero Day Initiative (ZDI) disclosed 171% more high severity vulnerabilities than in 2018. The criticality score reflects the likelihood of these flaws being leveraged by attackers, so high severity bugs are more likely to be weaponized and the patches should be prioritised.

To protect against today’s threat landscape, Trend Micro recommends a connected threat defense across gateways, networks, servers and endpoints. Additionally, these best practices can increase a company’s security posture:

* Mitigate ransomware with network segmentation, regular back-ups and continuous network monitoring.

* Update and patch systems and software to protect against known vulnerabilities.

* Enable virtual patching, especially for operating systems that are no longer supported by the vendor.

* Implement multi-factor authentication and least privilege access policies to prevent abuse of tools that can be accessed via admin credentials, like remote desktop protocol, PowerShell and developer tools.