Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News
      Truecaller cooperating with Info Regulator's Popia probe

      Truecaller cooperating with Info Regulator’s Popia probe

      25 March 2026
      Why Namibia slammed the door on Starlink

      Why Namibia slammed the door on Starlink

      25 March 2026
      Podcasters push back against regulatory overreach

      Podcasters push back against regulatory overreach

      25 March 2026
      Maziv plots fibre expansion blitz - Dietlof Mare

      Maziv plots fibre expansion blitz

      25 March 2026
      Jury finds Meta enabled child exploitation

      Jury finds Meta enabled child exploitation

      25 March 2026
    • World
      It's official: ads are coming to ChatGPT

      It’s official: ads are coming to ChatGPT

      23 March 2026
      Mystery Chinese AI model revealed to be Xiaomi's

      Mystery Chinese AI model revealed to be Xiaomi’s

      19 March 2026
      A mystery AI model has developers buzzing

      A mystery AI model has developers buzzing

      18 March 2026
      Samsung's trifold gamble ends in retreat

      Samsung’s trifold gamble ends in retreat

      17 March 2026
      Nvidia targets $1-trillion in AI chip sales as inference demand surges - Jensen Huang

      Nvidia targets $1-trillion in AI chip sales as inference demand surges

      17 March 2026
    • In-depth
      The last generation of coders

      The last generation of coders

      18 February 2026
      Sentech is in dire straits

      Sentech is in dire straits

      10 February 2026
      How liberalisation is rewiring South Africa's power sector

      How liberalisation is rewiring South Africa’s power sector

      21 January 2026
      The top-performing South African tech shares of 2025

      The top-performing South African tech shares of 2025

      12 January 2026
      Digital authoritarianism grows as African states normalise internet blackouts

      Digital authoritarianism grows as African states normalise internet blackouts

      19 December 2025
    • TCS
      Meet the CIO | HealthBridge CTO Anton Fatti on the future of digital health

      Meet the CIO | Healthbridge CTO Anton Fatti on the future of digital health

      23 March 2026
      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses - Clare Loveridge and Jason Oehley

      TCS+ | Arctic Wolf unpacks the evolving threat landscape for SA businesses

      19 March 2026
      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience - Theo van Zyl

      TCS+ | Vox Kiwi: a wireless solution promising a fibre-like experience

      13 March 2026
      TCS+ | Flipping the narrative on AI in the Global South - Josefin Rosén

      TCS+ | Flipping the narrative on AI in the Global South

      13 March 2026
      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      TCS | Sink or swim? Antony Makins on how AI is rewriting the rules of work

      5 March 2026
    • Opinion
      South Africa's energy future hinges on getting wheeling right - Aishah Gire

      South Africa’s energy future hinges on getting wheeling right

      10 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Apple just dropped a bomb on the Windows world

      5 March 2026
      VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

      VC’s centre of gravity is shifting – and South Africa is in the frame

      3 March 2026
      Hold the doom: the case for a South African comeback - Duncan McLeod

      Hold the doom: the case for a South African comeback

      26 February 2026
      The AI fraud crisis your bank is not ready for - Andries Maritz

      The AI fraud crisis your bank is not ready for

      18 February 2026
    • Company Hubs
      • 1Stream
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • Ascent Technology
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • HOSTAFRICA
      • Incredible Business
      • iONLINE
      • IQbusiness
      • Iris Network Systems
      • LSD Open
      • Mitel
      • NEC XON
      • Netstar
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Vodacom Business
      • Wipro
      • Workday
      • XLink
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Financial services
      • HealthTech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Policy and regulation
      • Public sector
      • Retail and e-commerce
      • Satellite communications
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » The evolution of ransomware: What to expect in 2020 and beyond

    The evolution of ransomware: What to expect in 2020 and beyond

    By Skybox Security18 June 2020
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Keeping pace with rapid change in the cybersecurity field, the evolution of ransomware has been swift and complex since the malware’s inception. The scattergun approach to ransomware distribution that used to be popular with criminals (peaking in 2017 with the WannaCry attack) has now fallen to the wayside in favour of more targeted attacks on individual businesses.

    The driver behind this change is simple: businesses are more likely to submit to the demands of the ransomware. They’re scared of the regulatory fines that they will be subject to if any data gets exposed (particularly since the advent of GDPR and other similar regulatory measures recently introduced across all 50 US states) so criminals know that they are more likely to pay, and pay big, if they fall prey to an attack.

    >> Listen to the podcast: Skybox Security on toughening up IT defences in a pandemic

    Attackers have been emboldened in this approach due, in no small part, to ransomware growing in sophistication. Look at Sodin (okibi) ransomware as one example. Released in 2019, it can burrow deep into a system to elevate privileges by planting itself in CPU architecture. This makes it much harder to detect and, therefore, less likely to be removed.

    Evolution of ransomware is driven by profitability

    Attackers don’t want to waste their time on ransomware that isn’t delivering on profitability. As ransomware becomes more sophisticated, the chances of its success increases. When criminals are confident that they can profit from organisations with deeper pockets than your average PC user, you can bet they’re going to give it a shot. And that’s exactly what’s happening now.

    This doesn’t mean that attackers have a lot of easy wins under their belts. Targeting specific businesses may require a lot of “dwell time” on a victim network, spending anywhere from days to months trying to identify a chink in the armour that they can exploit. Because of this, companies have time to detect and remediate any malicious presence. If they’re quick to act, they emerge unscathed and the only loss will be felt by the attacker. But if the attacker’s patience pays off, they’re likely to hit the jackpot.

    How doxware is changing the game

    There are new malware tactics being deployed by attackers that are helping them seal the deal during a successful ransomware attack. Look at doxware, for example, heralded by some as the next step in the evolution of ransomware. It may be new on the block – it was only in November 2019 that Maze ransomware became the first to offer attackers the ability to upload stolen data to a public site if they don’t receive payment – but it adds a new threat level that wasn’t there before. And it’s gaining in popularity. Since November, we’ve seen several new doxware products come onto the market.

    While the profits associated with successfully attacking a large organisation were compelling enough for most malicious actors, the ability to threaten the exposure of sensitive data makes attacking large organisations irresistible. The leverage that they gain through doxware is worth the additional time and effort expended during these targeted attacks. The more fear they can incite, the higher the payout.

    OT environments are under increasing threat from ransomware

    Another way that use of ransomware is developing can be found in the network areas in which it is, and will be, deployed. Specifically, criminals are honing their focus on operational technology (OT) environments. These are areas that are incredibly difficult to protect – they run on outdated technology that cannot be scanned or patched, many machines and devices are critical to operations so cannot be turned off and, although a lot of these machines pre-date the Internet, they are now being forced to connect with Web-connected devices – and are important at a nation-state level (particularly thinking about utilities like oil, gas, water, electricity, etc).

    New viable ransomware attacks on OT-adjacent systems have been demonstrated; this is something that’s only going to increase. As seen in the Vulnerability and Threats Report 2020, the number of new advisories issued by ICS-CERT between 2019 and 2020 increased by 53%. Attackers are coming after OT; ransomware is a very valuable tool and it’s doubtless that they are going to use it to its full potential.

    We’re going to hear about more ransomware attacks this year

    We can also expect to hear about more incidents as a result of companies now being forced to disclose data breaches. This is important to consider when you hear stories about a rise in ransomware attacks over the next year – the actual number of ransomware attacks may not dramatically increase, but the number of public disclosures will. Companies now have nowhere to hide.

    Finally, it’s important to talk about the current sophistication level of ransomware. Although attackers have made a lot of progress in terms of the malware’s sophistication, as an industry it is still fairly rudimentary from an economic perspective. There is a lot of room for growth, both in terms of malware sophistication and financial potential. The market is far from being saturated and the tools that are currently being deployed are not yet operating at maximum efficiency. Like any professional in any other industry, we can expect to see ransomware developers and deployers work to improve efficiency. This means that there will be greater depth to the business models used by deployers, including the intelligence on which their deployments are based.

    Really, we are in the early stages of ransomware’s potential. The need for security leaders to understand how criminals are able to implant this malware within their networks is great now and will get greater still as time moves on. The time to act to protect businesses from the real and present threat of ransomware is yesterday; if businesses fail to contain their network perimeter, they will likely be forced to pay out a lot of money – both to criminals and to relevant regulatory authorities.

    About Skybox Security
    At Skybox Security, we provide you with cybersecurity management solutions to help your organization innovate rapidly and with confidence. We get to the root of cybersecurity issues, giving you better visibility, context and automation across a variety of use cases. By integrating data, delivering new insights and unifying processes, you’re able to control security without restricting operational agility. Skybox’s comprehensive solution unites different security perspectives into the big picture, minimises risk and empowers security programmes to move to the next level. With obstacles and complexities removed, you can stay informed, work smarter and drive your organisation forward, faster.

    To learn more about Skybox Security, join one of our FREE technical workshops or contact us [email protected].

    • This promoted content was paid for by the party concerned
    Follow TechCentral on Google News Add TechCentral as your preferred source on Google


    Skybox Skybox Security
    WhatsApp YouTube
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEskom implements ‘load reduction’ in Gauteng
    Next Article Zimbabwe’s Econet expands use of Tesla batteries

    Related Posts

    4 tips for exposure management of your business applications - Skybox Security

    4 tips for exposure management of your business applications

    19 February 2025
    Network professionals lose nearly half their week to manual tasks that could be automated - Skybox Security report

    Network professionals lose nearly half their week to manual tasks that could be automated

    3 December 2024

    Skybox: half of firms fear security incidents due to siloed network and security teams

    17 October 2024
    Company News
    Why South Africa's technology leaders choose TechCentral

    Why South Africa’s technology leaders choose TechCentral

    25 March 2026
    Why most Cisco partners leave money on the table at renewal time - Westcon-Comstor

    Why most Cisco partners leave money on the table at renewal time

    25 March 2026
    The MSP stack is collapsing under its own weight. AI is forcing a reset - Acronis

    The MSP stack is collapsing under its own weight. AI is forcing a reset

    25 March 2026
    Opinion
    South Africa's energy future hinges on getting wheeling right - Aishah Gire

    South Africa’s energy future hinges on getting wheeling right

    10 March 2026
    Hold the doom: the case for a South African comeback - Duncan McLeod

    Apple just dropped a bomb on the Windows world

    5 March 2026
    VC's centre of gravity is shifting - and South Africa is in the frame - Alison Collier

    VC’s centre of gravity is shifting – and South Africa is in the frame

    3 March 2026

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Latest Posts
    Truecaller cooperating with Info Regulator's Popia probe

    Truecaller cooperating with Info Regulator’s Popia probe

    25 March 2026
    Why South Africa's technology leaders choose TechCentral

    Why South Africa’s technology leaders choose TechCentral

    25 March 2026
    Why Namibia slammed the door on Starlink

    Why Namibia slammed the door on Starlink

    25 March 2026
    Why most Cisco partners leave money on the table at renewal time - Westcon-Comstor

    Why most Cisco partners leave money on the table at renewal time

    25 March 2026
    © 2009 - 2026 NewsCentral Media
    • Cookie policy (ZA)
    • TechCentral – privacy and Popia

    Type above and press Enter to search. Press Esc to cancel.

    Manage consent

    TechCentral uses cookies to enhance its offerings. Consenting to these technologies allows us to serve you better. Not consenting or withdrawing consent may adversely affect certain features and functions of the website.

    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    • Manage options
    • Manage services
    • Manage {vendor_count} vendors
    • Read more about these purposes
    View preferences
    • {title}
    • {title}
    • {title}