April 17, 2017 By Larry Loeb 2 min read

At the end of 2016, many analysts believed the Locky and Cerber ransomware families would duke it out for control of the malware market in 2017. According to a recent Malwarebytes report, “Cybercrime Tactices and Techniques Q1 2017,” the Cerber family has resoundingly won.

The report revealed that, during its peak, Cerber’s market share domination approached that of TeslaCrypt during its most popular period of activity, which was the first half of 2016. Cerber kicked off 2017 with a huge 70 percent market share and approached 90 percent toward the end of the quarter.

Locky, on the other hand, faded to has-been status. It had just 2 percent market share by the end of March, according to data gathered by Malwarebytes-controlled honeypots.

One Step Ahead of Security

Cerber usually arrives via an email attachment. The attachment contains a link to a malicious self-extracting archive, which is stored in an attacker-controlled Dropbox account.

As a family, Cerber is optimized for criminal activity. New versions have appeared incrementally, featuring enhancements to evade security software — notably behavioral analysts and machine learning tools.

Trend Micro reported, for example, that recent iterations of Cerber include a new loading process that may cause problems for static machine learning approaches. These are the defense methods that analyze files without executing or emulating them. The ransomware can still be detected by a multilayer approach that does not rely on one technology, however.

Cerber Ransomware Demands Vigilance

According to Microsoft, Cerber accounted for more than one-quarter of all enterprise endpoint infections between Dec. 16, 2016 and Jan. 15, 2017. That’s not quite as high a surge as Malwarebytes detected, but it’s still the highest rate of infection during that period.

Cerber also uses its own ransomware-as-a-service (RaaS) business model, which differs greatly from predecessors such as TeslaCrypt. The authors appear to be trying to make the malware as user-friendly as possible for the threat actors who distribute it.

Security professionals have come to accept constant mutation as a given with any ransomware. Cerber, however, demands a particularly high level of vigilance.

More from

CISA warns about credential access in FY23 risk & vulnerability assessment

3 min read - CISA released its Fiscal Year 2023 (FY23) Risk and Vulnerability Assessments (RVA) Analysis, providing a crucial look into the tactics and techniques threat actors employed to compromise critical infrastructure. The report is part of the agency’s ongoing effort to improve national cybersecurity through assessments of vulnerabilities in key sectors. Meanwhile, IBM’s X-Force Threat Intelligence Index 2024 has identified credential access as one of the most significant risks to organizations.Both reports shed light on the persistent and growing threat of credential…

Are we getting better at quantifying risk management?

4 min read - As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become a crucial component of securing the necessary resources for cybersecurity programs.What approach do companies use today for cyber risk quantification? And how has cyber risk…

Trends: Hardware gets AI updates in 2024

4 min read - The surge in artificial intelligence (AI) usage over the past two and a half years has dramatically changed not only software but hardware as well. As AI usage continues to evolve, PC makers have found in AI an opportunity to improve end-user devices by offering AI-specific hardware and marketing them as "AI PCs."Pre-AI hardware, adapted for AIA few years ago, AI often depended on hardware that was not explicitly designed for AI. One example is graphics processors. Nvidia Graphics Processing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today