- Buy Microsoft Visio Professional or Microsoft Project Professional 2024 for just $80
- Get Microsoft Office Pro and Windows 11 Pro for 87% off with this bundle
- Buy or gift a Babbel subscription for 78% off to learn a new language - new low price
- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
Ransomware Actors Embrace Intermittent Encryption
Threat actors are increasingly turning to a new encryption method in their ransomware attacks, designed to improve success rates, according to SentinelOne.
SentinelLabs researchers Aleksandar Milenkoski and Jim Walter wrote in a new blog post that “intermittent encryption” is being heavily advertised to buyers and affiliates.
Its primary advantages over more traditional methods of ransomware encryption are speed and its ability to evade threat detection tools.
By only partially encrypting victims’ files, threat actors can cause “irretrievable damage in a very short time frame,” the duo wrote.
Further, intermittent encryption helps to confuse the statistical analysis used by security tools to detect ransomware activity.
“Such an analysis may evaluate the intensity of file IO operations or the similarity between a known version of a file, which has not been affected by ransomware, and a suspected modified, encrypted version of the file,” Milenkoski and Walter wrote.
“In contrast to full encryption, intermittent encryption helps to evade such analyses by exhibiting a significantly lower intensity of file IO operations and much higher similarity between non-encrypted and encrypted versions of a given file.”
Back in mid-2021, LockFile was the first variant to use the new technique, encrypting every other 16 bytes of a file. It was assessed by a Splunk study earlier this year to be the fastest out of 10 ransomware variants, encrypting nearly 100,000 files, totaling almost 53GB, in just four minutes.
That was 86% faster than the median of 43 minutes across all variants studied.
Since LockBit, SentinelOne has identified several ransomware families following suit and adopting intermittent encryption, including Qyick, Agenda, BlackCat (ALPHV), Play, and Black Basta.
The security industry may have to adapt to the new trend in order to improve its detection capabilities.
“Given the significant benefits to threat actors while also being practical to implement, we estimate that intermittent encryption will continue to be adopted by more ransomware families,” SentinelOne warned.