When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

In recent years, ransomware attacks have surged, becoming the most notorious cyber threat.

However, this version of RaaS is no longer relevant.

An abstract image of a lock against a digital background, denoting cybersecurity.

(Image Credit: TheDigitalArtist / Pixabay)

Starting with 2016, the RaaS model has been based on a profit-sharing scheme inspired by the gig economy.

These attributes apply also to the RaaS model.

Technical Solutions Director at Bitdefender.

At the end of a successful operation the operators and affiliates split the profits.

Affiliates don’t waste time and resources building their own ransomware.

Instead, they focus efforts on the most lucrative part of the scheme: launching attacks and collecting ransoms.

This streamlined approach allows them to target a wider range of victims and potentially rake in more profits.

Data exfiltration coupled withencryptionhas become a key tactic for ransomware groups to double extort their victims.

In addition to encrypting data and demanding payment for its release, cybercriminal steal sensitive information to blackmail victims.

Thus, most effort is invested in hacking rather than encryption.

A concerning trend involves attackers exploiting vulnerabilities in internet accessible edge devices and applications.

For instance, the Log4j flaw (2021) took about a month to weaponize after its discovery.

Today, attackers exploit new vulnerabilities in popular platforms within 24 hours.

Supply chain expansion is another key trend that will continue throughout the course of 2024 and beyond.

The primary goal is to bolster defenses against manual hacking operations.

We list the best access control systems.

The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.

If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro