Categories: Cyber Security News

Ransomware Groups Intensify Attacks on Financial Sector, 406 Incidents Exposed

The financial sector emerged as a prime target for cybercriminals, with Flashpoint analysts documenting 406 publicly disclosed ransomware attacks-accounting for seven percent of all known ransomware victim listings in that period.

This persistent onslaught underscores the sector’s enduring allure for threat actors, driven by the high value and criticality of financial institutions’ operations, their rich troves of transactional records, and volumes of confidential customer data.

While ransomware incidents continue to grab headlines, analysts warn that these represent only a fraction of the threat landscape.

The financial industry is increasingly contending with the growing sophistication of Advanced Persistent Threat (APT) groups, third-party compromises, the bustling black market for initial access credentials, insider threats, and the rapid evolution of fraud techniques such as deepfakes and impersonation.

The high stakes and interconnectedness of financial entities with broader economic infrastructure only amplify the potential fallout of such incidents, both for the organizations directly targeted and for their extended network of clients and partners.

Prolific Threat Actors Emerge as Top Adversaries

Several ransomware and financially-motivated groups have risen to prominence over the past year. RansomHub, a newcomer to the ransomware-as-a-service (RaaS) ecosystem since early 2024, rapidly became the second-most active such group, targeting 38 financial organizations.

Their tactics leverage phishing campaigns and exploits of known vulnerabilities, and they have also directed attacks at sectors like healthcare.

Akira, active since March 2023, executed 34 attacks on financial organizations within the assessment period.

Possibly linked to remnants of the Conti ransomware group, Akira favors initial access routes such as compromised credentials, VPN, and RDP vulnerabilities, often employing double extortion models-exfiltrating data prior to encryption and demanding ransom for both decryption and non-disclosure.

LockBit, a longstanding RaaS threat since 2019, claimed 29 financial sector victims.

Its operators utilize a variety of entry points, from phishing and vulnerability exploitation to compromised remote services.

LockBit notably asserted it had infiltrated the US Federal Reserve in June 2024, posting data purportedly exfiltrated from the institution, though subsequent analysis attributed the breach to Evolve Bank & Trust instead.

Other major actors include FIN7, which has pilfered vast sums through attacks on interbank transfer systems, ATM networks, and POS terminals using sophisticated phishing and infrastructure compromise.

Scattered Spider, notorious for SMS phishing and inventive credential theft via fake SSO pages; and North Korean-backed Lazarus Group, targeting both cryptocurrency exchanges and conventional financial institutions with spear-phishing, malware-laden image files, and watering-hole attacks.

Expanding Attack Vectors and New Forms of Fraud

Beyond direct system breaches, financial institutions have faced mounting risks from third-party and supply chain compromises.

High-profile examples, such as Clop ransomware’s exploitation of the MOVEit vulnerability in late 2024, demonstrate the systemic risk posed by vulnerable vendors.

Meanwhile, initial access brokers (IABs) are thriving, with 6,406 forum posts related to financial sector access listings recorded by Flashpoint in the past year, offering compromised credentials and entry points to wider criminal networks.

Insider threat remains a persistent concern, with messaging platforms like Telegram emerging as key forums for recruiting insiders willing to facilitate unauthorized data access or compromise systems.

The proliferation of AI-driven fraud techniques, particularly deepfakes, marks a concerning trend: threat actors are leveraging increasingly realistic synthetic audio and video to bypass identity verification and commit fraud.

In the past twelve months, analysts observed over 1,200 posts discussing impersonation strategies within finance-focused Telegram channels.

As financial institutions continue to modernize and integrate digital solutions, Flashpoint’s analysis suggests their exposure to a widening array of cyber threats is likely to persist.

Comprehensive intelligence and resilient security strategies remain essential as the sector remains firmly in the crosshairs of some of the world’s most sophisticated cybercriminal groups.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

The post Ransomware Groups Intensify Attacks on Financial Sector, 406 Incidents Exposed appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Pennsylvania Commonwealth Court Overturns Ban on Medicaid Coverage for Abortions

Women’s reproductive rights – and abortion access – won big Monday in Pennsylvania’s Commonwealth Court.…

36 minutes ago

Freeport sewer system overwhelmed with foreign materials

FREEPORT, Ill. (WTVO) — Recent heavy rainfall is only making issues worse in the city…

40 minutes ago

State Forest Expansion

BROWN COUNTY, Ind. (WOWO) — Indiana Governor Mike Braun and the Department of Natural Resources…

41 minutes ago

Daredevil: Born Again Season 2, Episode 6 Review – “Requiem”

Full spoilers follow for Daredevil: Born Again Season 2, Episode 6, "Requiem," which is streaming…

1 hour ago

Save 20% Off the Apple AirPods Pro 3, the Best Wireless Earbuds for iPhone

Don't pay full price for your AirPods from the Apple Store. For a limited time,…

3 hours ago

Indiana Governor Mike Braun On illegal Aliens With Commercial Drivers’ Licenses

INDIANAPOLIS, Ind. (WOWO) — Indiana Governor Mike Braun announced on Monday that he has signed…

4 hours ago

This website uses cookies.