Friday , March 21 2025

Geopolitical conflicts contributed to 53% increase in ransomware attacks on India in 2022: CERT-In

There has been a 53 per cent increase in ransomware incidents in India in 2022 when compared to 2021, the Indian Computer Emergency Response Team (CERT-In) said in a report.

The CERT-In, in its India Ransomware Report released on April 13, said, in 2022, among various sectors, IT and ITeS was majorly impacted followed by finance and manufacturing.

IBM and Veeam Release Patches in AIX System and Backup

IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings,...
Read More
IBM and Veeam Release Patches in AIX System and Backup

WhatsApp patched zero-click flaw exploited in spyware attacks

WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware following reports from security researchers at the...
Read More
WhatsApp patched zero-click flaw exploited in spyware attacks

CVE-2025-24472
CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass...
Read More
CVE-2025-24472  CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

11 state hackers exploit new Windows zero-day since 2017

11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows....
Read More
11 state hackers exploit new Windows zero-day since 2017

Hackers Exploit ChatGPT with CVE-2024-27564

Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research...
Read More
Hackers Exploit ChatGPT with CVE-2024-27564

(CVE-2024-540385)
CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote...
Read More
(CVE-2024-540385)  CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

CVE-2025-24813
Apache Tomcat Flaw Exploited In The Wild

CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a...
Read More
CVE-2025-24813  Apache Tomcat Flaw Exploited In The Wild

B1nary_Band1ts secure first for “MIST CyberTron 2025”

MIST Cyber Security Club hosted an exciting MIST CyberTron 2025, featuring a CTF competition, hacking sessions, live demonstrations, and real-world...
Read More
B1nary_Band1ts secure first for “MIST CyberTron 2025”

CVE-2025-24016
Critical RCE vulnerability affects Wazuh

Cybersecurity researchers unveil a critical remote code execution vulnerability (CVE-2025-24016) in Wazuh, a popular open-source SIEM platform. The vulnerability has...
Read More
CVE-2025-24016  Critical RCE vulnerability affects Wazuh

AWS SNS misused for Data Exfiltration and Phishing

A recent report from Elastic reveals that threat actors misuse Amazon Web Services (AWS) Simple Notification Service (SNS) for malicious...
Read More
AWS SNS misused for Data Exfiltration and Phishing
Major ransomwares such as Lockbit, Makop, and DJVU/Stop ransomware continued targeting critical infrastructure organisation and “disrupted critical services in order to pressurise and extract ransom payments,” CERT-In said in the report.

Source: CERT-InSource: CERT-In

CERT-In observed that the motivation towards perpetrating ransomware attacks was not just money, but also “geo political conflicts”. “This trend may continue further when ransomware broadens its spectrum beyond financial aspects and becomes an arsenal for cyberwarfares,” the report said.

The nodal cybersecurity agency of the country also observed that phishing was a major point of initial network access for attackers, apart from them exploiting known vulnerabilities in applications and systems.

How ransomwares work (Source: CERT-In) How ransomwares work (Source: CERT-In)

“In addition, system misconfigurations, brute force attacks, unmanaged devices, insider threats and supply chain attacks are becoming concerning risk factors,” the report added.

This report comes at a time when Indian government websites have been reported of being targeted by Indonesian hacktivists, and few months after All India Medical Institute of Medical Sciences suffered a major ransomware breach that rendered several of its services inaccessible.

Earlier the government had also informed in the Parliament that 19 ransomware attacks were recorded against various government organisations in 2022, which was almost three times of those in the previous year.

10 days to restore services

On an average, the CERT-In report found that, a large organisation, after suffering a ransomware attack, took about 10 days to restore.

“For smaller network/infrastructure, the restoration time is around 3 days and for individual systems it is 1 day,” it said.

Source: CERT-In Source: CERT-In

The report further observed that ransomware gangs were deploying innovative tactics “to improve operational efficiency”.

“Some groups are rebranding themselves and some are carrying out low-profile attacks to avoid the attention of law enforcement,” the report said.

CERT-In urged organisations to shore up their capabilities for monitoring and early detection of ransomware infection.

“As prevention is better than cure, it is desirable to understand the attack surface and ensure hardening of all internet-exposed assets and improve security posture to minimise the Ransomware attack probability,” the report said.

Check Also

March 2025

Qualcomm’s March 2025 Security Bulletin Highlights Major Vulns

Qualcomm’s March 2025 Security Bulletin addresses vulnerabilities in its products, including automotive systems, mobile chipsets, …

Leave a Reply

Your email address will not be published. Required fields are marked *