Google research confirms ransomware groups now deleting backups to obstruct recovery

default-cybersecurity-insiders-image

In the world of cybersecurity, ransomware attacks have long been a serious concern for organizations, with a well-established strategy for victims: recovering data from backups. When databases are encrypted by malicious actors, organizations that refuse to pay the ransom can often restore their systems from secure, offline backups. However, a worrying trend has emerged in recent years, as some ransomware groups are now targeting these backups, effectively blocking the victim’s ability to recover data without yielding to the demands of the attackers.

This growing threat has been highlighted in Google Cloud’s latest Cloud Threat Horizons Report, where researchers warn that ransomware groups are increasingly focused on disrupting backup systems as part of their attack strategies. The report details how cybercriminals are finding ways to infiltrate and corrupt backup environments, leaving organizations with little to no option for recovery other than paying the ransom.

Deepening Concerns: Insights from Google Cloud’s 2024 Analysis

The issue of ransomware disrupting backups was underscored by Google Cloud’s researchers, who analyzed Mandiant’s 2024 incident response cases. Their findings revealed a disturbing trend in how sophisticated ransomware actors are becoming in their approach. What was once a straightforward crime—demanding payment in exchange for restoring access to encrypted data—has evolved into a much more complex and perilous threat, with attackers now aiming to eliminate recovery options altogether. This makes the situation even more dire for businesses that may be relying solely on backups for their disaster recovery strategies.

While this heightened risk is concerning globally, it is particularly prevalent in the Asia-Pacific (APAC) region. The economies within this region are at vastly different stages of digital transformation, with some firms becoming fully cloud-centric, while others continue to operate with on-premise or hybrid infrastructures. This variance in digital maturity makes some organizations more vulnerable to ransomware attacks than others, especially as they grapple with different levels of security awareness and preparedness.

The Critical Role of Backups in Disaster Recovery

For any organization, backups serve as a lifeline in the event of a ransomware attack. These backups are often home to critical data, including sensitive personal information, intellectual property, and financial records. In the face of a cyberattack, having a secure backup solution can be the difference between a quick recovery and complete operational paralysis. Backups ensure that an organization can get back on its feet quickly, minimizing downtime and reducing the financial and reputational damage caused by the disruption.

However, as ransomware attacks become more targeted and sophisticated, relying solely on traditional backup systems is no longer enough. Attackers are increasingly focused on disabling these backup systems as part of their infiltration process. This means that organizations must rethink their backup and disaster recovery strategies to ensure that their data remains safe and recoverable—even in the face of the most advanced cyber threats.

New Challenges in Cloud Environments

The Cloud Threat Horizons Report also sheds light on the growing risks within cloud environments. Google’s security researchers observed that ransomware groups are now targeting cloud infrastructure as a new vector for attack. Cloud service providers (CSPs) are increasingly being seen as high-value targets, as they often hold massive amounts of data that could be exploited for ransom.

In response to this evolving threat, Google Cloud has proposed a solution to mitigate the risks associated with ransomware attacks and backup disruptions: Cloud Isolated Recovery Environments (CIRE). This innovative approach involves spreading backup data across multiple cloud environments, creating a decentralized and secure recovery system. The idea behind CIRE is that it allows organizations to test data restoration processes in a safe, isolated environment, without the risk of affecting their production systems or exposing them to further attacks.

The Benefits of Cloud Isolated Recovery Environments

CIRE offers several advantages in the context of disaster recovery:

Risk-Free Testing: Organizations can test their backup restoration processes in a safe, isolated cloud environment, ensuring that recovery works as intended before being deployed in live systems.

Enhanced Security: By distributing backup data across multiple cloud environments, CIRE minimizes the likelihood that attackers can successfully target and compromise all backup locations.

Faster Recovery: When an organization is under attack, the ability to restore data without risking re-infection or downtime is critical. CIRE environments provide a reliable and rapid way to recover data, even in the event of an active ransomware attack.

Scalability and Flexibility: As demand for cloud recovery grows, these cloud-based environments allow for easy scalability, ensuring that organizations can quickly restore large volumes of data without compromising system performance.

Strengthening Cloud Security Hygiene

As ransomware attacks evolve and increasingly target cloud environments, cloud service providers are urging their customers to adopt a more rigorous approach to cloud security hygiene. The first line of defense involves enforcing Multi-Factor Authentication (MFA) to ensure that only authorized users can access critical systems and data. In addition, organizations must adopt the principle of least privilege access, ensuring that users only have access to the data and systems they absolutely need to do their jobs.

Active monitoring is another key element of strong cloud security hygiene. Organizations should continuously track access changes, identify credential leaks, and use automated detection systems to spot misconfigurations or unusual activity within cloud environments. By doing so, organizations can quickly detect potential threats and take action to prevent attackers from exploiting vulnerabilities.

The Future of Cloud Security in APAC

For organizations in the APAC region, where digital maturity varies significantly across countries, adopting best practices in cloud security and backup systems has never been more critical. With ransomware groups increasingly targeting cloud-based infrastructures, adopting robust cloud security hygiene measures and isolated recovery environments is essential for ensuring business continuity and safeguarding against future attacks.

As the threat landscape continues to evolve, it is clear that organizations must stay ahead of the curve by adopting proactive security measures and investing in innovative solutions like Cloud Isolated Recovery Environments. By doing so, they can better protect their critical data and systems from malicious actors, ensuring that their business remains resilient in the face of modern cyber threats.

Join our LinkedIn group Information Security Community!

Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display