{"id":3668,"date":"2022-02-18T03:32:00","date_gmt":"2022-02-18T03:32:00","guid":{"rendered":"https:\/\/dedicatedserverabr.kinsta.cloud\/?p=3668"},"modified":"2026-01-25T07:53:27","modified_gmt":"2026-01-25T07:53:27","slug":"ransomware-comes-amarching","status":"publish","type":"post","link":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching","title":{"rendered":"Ransomware Comes A&#8217;Marching"},"content":{"rendered":"\n<p>It&#8217;s time to revisit the ransomware scene \u2013 a year on from our last encounter.<\/p>\n\n\n\n<p>What\u2019s it getting up to these days? Who\u2019s running the show? Do they still have the upper hand, or are they losing some ground? Finding the answers to some of these questions might help us predict how the rest of the year is going to pan out, and what that means for us: the good guys.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Then vs. Now<\/h2>\n\n\n\n<p>In 2021 we took a deep-dive into&nbsp;<a href=\"https:\/\/www.blackfog.com\/the-state-of-ransomware-in-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">Black Fog\u2019s State of Ransomware Report<\/a>, which gave us all the juicy details on attack numbers, target sizes, locations, and costs involved for ransomware in 2020 and 2021.<\/p>\n\n\n\n<p>Looking at the&nbsp;<a href=\"https:\/\/www.blackfog.com\/the-state-of-ransomware-in-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">same report, 12 months later<\/a>, gives us a wider picture of what\u2019s been happening while we\u2019ve been gone:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Number of Attacks<\/strong>&nbsp;per month are up \u2013 and have been on this trend for the past two years:<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dedicatedserverabr.kinsta.cloud\/Images\/Blogs\/Picture1(1).png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The<strong>&nbsp;target-organization size<\/strong>&nbsp;on the other hand is continuing in the trend seen at the end of 2021, with the shift to mid-sized organizations:<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dedicatedserverabr.kinsta.cloud\/Images\/Blogs\/Picture2.png\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RDP compromise, followed by email phishing, remain the<strong>&nbsp;top attack vectors<\/strong>:<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dedicatedserverabr.kinsta.cloud\/Images\/Blogs\/Picture3.png\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Changes on the Scene<\/h2>\n\n\n\n<p>The data tells us that although infiltration tactics are staying the same, attacks are on the increase so far in 2022. So, what changes have we seen in the ransomware scene that have contributed to the rising numbers of attacks in January?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The \u2018What\u2019:<\/h3>\n\n\n\n<p><strong>\u2022 Paying the ransom<\/strong>&nbsp;is becoming more common as organizations find themselves debilitated after ransomware attacks. In 2021, despite the \u2018official\u2019 advice from governments that companies do not meet the demands of cybercriminals, many large and well-known organizations paid staggering ransoms:&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-20\/cna-financial-paid-40-million-in-ransom-after-march-cyberattack?sref=ExbtjcSG\" target=\"_blank\" rel=\"noreferrer noopener\">CNA Financial<\/a>,&nbsp;<a href=\"https:\/\/www.bbc.co.uk\/news\/business-57178503\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline<\/a>, and&nbsp;<a href=\"https:\/\/www.wsj.com\/articles\/jbs-paid-11-million-to-resolve-ransomware-attack-11623280781\" target=\"_blank\" rel=\"noreferrer noopener\">JBS foods<\/a>, to name a few. SophosLabs\u2019 own&nbsp;<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">State of Ransomware Report<\/a>&nbsp;revealed that in 2021, the percentage of victims who paid up increased by 6%:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dedicatedserverabr.kinsta.cloud\/Images\/Blogs\/Picture4.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Image:&nbsp;<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SophosLabs\u2019 2021 State of Ransomware Report<\/a>.<\/em><\/p>\n\n\n\n<p>\u2022 Failure of&nbsp;<strong>ransom payouts to actually work<\/strong>. SophosLabs\u2019 revealed that the average amount of data recovered after an attack and a ransom payout was 65%, with only 8% of the study\u2019s participants getting all of their data back:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dedicatedserverabr.kinsta.cloud\/Images\/Blogs\/Picture5.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Image:&nbsp;<a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SophosLabs\u2019 2021 State of Ransomware Report<\/a>.&nbsp;<\/em><\/p>\n\n\n\n<p>\u2022 Another change is the increased&nbsp;<strong>backlash from the public<\/strong>&nbsp;if a ransom is paid. It turns out the average Joe has become more judgmental over the past year. According to&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/02\/16\/whos-the-next-victim-predictions-on-the-state-of-ransomware-in-2022\/?sh=711cb883ab79\" target=\"_blank\" rel=\"noreferrer noopener\">Forbes<\/a>, paying a ransom breeds distrust, and a general feeling from consumers that the organization in question is to blame for the undesirable situation.<\/p>\n\n\n\n<p>\u2022 A new tactic has emerged in the form of the &#8216;double-ransom&#8217;, thanks to<strong>&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/02\/16\/whos-the-next-victim-predictions-on-the-state-of-ransomware-in-2022\/?sh=711cb883ab79\" target=\"_blank\" rel=\"noreferrer noopener\">increasing data exfiltration tactics<\/a><\/strong>. Instead of just encrypting your data, actors are exfiltrating it, so that if you have the nerve to refuse to pay a ransom to obtain a decryption key, they can blackmail you again with the threat of publicizing your data.<\/p>\n\n\n\n<p>\u2022 Another noticeable change is just how noticeable ransomware attacks are becoming to the everyday consumer (you and I) due to specifically targeted attacks causing<strong>&nbsp;<a href=\"https:\/\/www.cisa.gov\/news\/2022\/02\/09\/cisa-fbi-nsa-and-international-partners-issue-advisory-ransomware-trends-2021\" target=\"_blank\" rel=\"noreferrer noopener\">supply-chain disruptions<\/a><\/strong>. Where ransomware attacks were once a far cry from our everyday lives&nbsp;\u2013 something that the big companies had to deal with, and we only read about in the news \u2013 they\u2019re now having far-reaching impacts that may affect our everyday lives. Take the&nbsp;<a href=\"https:\/\/www.bbc.co.uk\/news\/business-57178503\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline attack<\/a>&nbsp;in May 2021: gas stations throughout the US had to close up shop due to the shortage of fuel \u2013 a direct result of supply-chain \/ industrial process disruption from a tactical ransomware attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The \u2018Who\u2019:<\/h3>\n\n\n\n<p>\u2022 While REvil has been a household name on the ransomware scene for the past few years, their future is in doubt coming into 2022.&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/world\/2022\/01\/14\/russia-hacker-revil\/\" target=\"_blank\" rel=\"noreferrer noopener\">14 members of the gang were arrested<\/a>&nbsp;in mid-January by Russia\u2019s domestic security agency \u2013 including the hacker who perpetrated the Colonial Pipeline attack mentioned above. However, aside from REvil, the other well-known gangs are still around and causing mayhem (DarkSide, Conti, BlackMatter).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The \u2018How\u2019:<\/h3>\n\n\n\n<p>\u2022 We know the tactics of infiltration have stayed the same over the past year (and beyond \u2013 when will people learn to monitor RDP ports sufficiently?), but there\u2019s been a continuing shift in how ransomware gangs themselves operate, and it\u2019s terrifying. The<strong>&nbsp;increasingly \u2018professional\u2019 and organized ransomware market<\/strong>&nbsp;is seeing the&nbsp;<a href=\"https:\/\/www.discerningdata.com\/2021\/disruptionware-vii-the-evolution-of-disruptionware-and-the-growth-of-ransomware-as-a-service-raas\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware-as-a-Service (RaaS) model<\/a>&nbsp;on the rise from 2021: less skilled cyber actors can simply purchase or subscribe to existing ransomware tools or services, and then use the product to enact attacks as they see fit. What was once able to be achieved by only the most talented hackers out there, is now available to any Tom, Jack or Harriet.<\/p>\n\n\n\n<p>\u2022 \u2018Gentlemen\u2019s Game\u2019 is going out the window, with ransomware actors<strong>&nbsp;breaking unspoken rules<\/strong>&nbsp;left, right and center: there have been increasing attacks on the health sector, and,&nbsp;<a href=\"https:\/\/www.cisa.gov\/news\/2022\/02\/09\/cisa-fbi-nsa-and-international-partners-issue-advisory-ransomware-trends-2021\" target=\"_blank\" rel=\"noreferrer noopener\">according to CISA<\/a>, a tending towards attack-launches during weekends and holiday periods; when attackers know they will likely be able to able to do more damage before being detected.<\/p>\n\n\n\n<p>\u2022 Another change in operations not seen before is the relations between ransomware gangs and bad actors. CISA points out that gangs have been&nbsp;<strong><a href=\"https:\/\/www.cisa.gov\/news\/2022\/02\/09\/cisa-fbi-nsa-and-international-partners-issue-advisory-ransomware-trends-2021\" target=\"_blank\" rel=\"noreferrer noopener\">networking more and more<\/a><\/strong>: sharing information about their victims with each other, including network-access information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Predictions for the Future<\/h2>\n\n\n\n<p>In some industries, it\u2019s never advisable to try and predict the future. The stock market, the housing market, the weather, to name a few. Cybersecurity does not fall under that umbrella. Predict, predict, predict, and predict the absolute worst!<\/p>\n\n\n\n<p>The ransomware market is expected to continue on the trajectory we\u2019ve seen at the end of 2021 and the beginning of 2022:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cybercrime organization and professionalism is going to keep improving, with ransomware gangs continuing to share data amongst each other and up the ante with the Ransomware-as-a-Service method.<\/li>\n\n\n\n<li>Ransoms will continue to be paid against government advice as organizations suffer \u2013 but the effects of doing so will start to have more of an impact, with their decreasing rate of effectiveness (in terms of recovering data), as well as the decreasing understanding and sympathy from consumers.<\/li>\n\n\n\n<li>Industrial processes and supply-chain operations will be targeting more heavily after the recent success seen in these areas \u2013 and we may well notice the impact in our everyday lives.<\/li>\n\n\n\n<li>Data exfiltration and the \u2018double-ransom\u2019 (another successful tactic) will be increasingly employed.<\/li>\n\n\n\n<li>Ransomware gangs and bad actors will stoop to new lows in terms of vulnerable targets and well-thought-out launch tactics.&nbsp;<a href=\"https:\/\/itbrief.co.nz\/story\/new-lows-for-ransomware-attacks-decline-in-critical-infrastructure-defences-expected-in-2022\" target=\"_blank\" rel=\"noreferrer noopener\">IT Brief notes<\/a>&nbsp;that in 2022 we\u2019re likely to see gangs targeting countries where they know they\u2019ll receive less kickback, particularly after Russia\u2019s crackdown on REvil.<\/li>\n<\/ul>\n\n\n\n<p>In terms of our response to cybercriminals in the year to come, ZDNet reports that a&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-in-2022-were-all-screwed\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u2018Paying to Prevent\u2019 tactic&nbsp;<\/a>may emerge, with organizations actually&nbsp;<em>paying ransomware gangs<\/em>&nbsp;a regular fee to ensure they don\u2019t get targeted.<\/p>\n\n\n\n<p>To combat the continuing meeting-of-demands by victim organizations, governments are likely to start cracking down on ransom payouts and begin to take&nbsp;<a href=\"https:\/\/itbrief.co.nz\/story\/new-lows-for-ransomware-attacks-decline-in-critical-infrastructure-defences-expected-in-2022\" target=\"_blank\" rel=\"noreferrer noopener\">more offensive action against gangs<\/a>&nbsp;(what we\u2019ve already started to see in Russia).<\/p>\n\n\n\n<p>ZDNet also points out the potential&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-in-2022-were-all-screwed\/\" target=\"_blank\" rel=\"noreferrer noopener\">impact on cyber insurance&nbsp;<\/a>in the future. With ransoms regularly being paid into the millions; how much longer will ransomware attacks be covered by insurers? If insurance companies do continue to offer cover, premiums could reach new highs, and organizations seeking cover will likely have to jump through hoops to meet the eligibility criteria.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to Do<\/h2>\n\n\n\n<p>For starters:&nbsp;<strong>DON\u2019T<\/strong>&nbsp;start paying ransomware gangs to keep their mitts off you (talk about counterproductive!).<\/p>\n\n\n\n<p><strong>DO<\/strong>&nbsp;start implementing a zero-trust strategy. In fact, don\u2019t just implement it: embrace it. Welcome it with open arms. Because we can make predictions until we\u2019re blue in the face, but the one thing we know for certain is that if you haven\u2019t implemented zero-trust, you\u2019re at much greater risk of becoming victim to a ransomware attack.<\/p>\n\n\n\n<p><a href=\"\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Admin By Request\u00a0<\/a>is a cybersecurity solution which enforces zero-trust through the Principle-of-Least Privilege (POLP). It minimizes your organization\u2019s attack window by instantly revoking all administrative access, and instead provides an application for Just-In-Time elevation, on an as-needed basis:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>All users become regular, protected users. When they need administrative access, they simply use the client to request the access they need.<\/li>\n\n\n\n<li>All admin sessions are logged, with attempts at privilege escalation (popular amongst ransomware actors) easily detected by the software\u2019s alerting and Auditing capabilities.<\/li>\n<\/ul>\n\n\n\n<p>Once ransomware actors infiltrate the system, they often rely on privilege escalation to succeed. With Admin By Request, infiltration in the first place is close to impossible, as all file downloads are scanned by multiple anti-malware engines. Attempts at privilege escalation are rendered fruitless as users simply don&#8217;t have the required admin rights. Hackers would have to vertically escalate to a more privileged status to make any ground whatsoever &#8211; an activity that would be detected immediately by the software solution if attempted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>It doesn\u2019t have to be all doom, gloom, and warnings.<\/p>\n\n\n\n<p>If anything, this blog is intended to be more of a friendly update \u2013 a check-in on the ransomware scene so that we can better predict where it\u2019s headed in 2022.<\/p>\n\n\n\n<p>Do yourself a favor and stay updated with what\u2019s going on. Take the pre-emptive steps to get adequate protection, implement zero-trust with\u00a0<a href=\"\/en\/product-overview\" target=\"_blank\" rel=\"noreferrer noopener\">Admin By Request<\/a>, and make sure you\u2019re always one step ahead of ransomware gangs and their tactics this coming year.<\/p>\n\n\n\n<p>I guarantee, this time next March \u2013 you\u2019ll be grateful you did.<\/p>\n\n\n\n<p>Did you know Admin By Request is free? Get it\u00a0<a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>\u00a0for up to 25 endpoints.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.<\/p>\n","protected":false},"author":2,"featured_media":7300,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[130,131,134,90,129,91,82,135,79],"ppma_author":[9],"class_list":["post-3668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-antimalware","tag-antivirus","tag-attack","tag-cyber-criminal","tag-cyberattack","tag-hacker","tag-malware","tag-ransom","tag-ransomware","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"antimalware,antivirus,attack,cyber criminal,cyberattack,hacker,malware,ransom,ransomware\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Ransomware Comes A\u2019Marching \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-02-18T03:32:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:53:27+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Ransomware Comes A\u2019Marching \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#blogposting\",\"name\":\"Ransomware Comes A\\u2019Marching \\u00bb Admin By Request\",\"headline\":\"Ransomware Comes A&#8217;Marching\",\"author\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/ABR-Marching-Tech-No-TXT.png\",\"width\":1340,\"height\":662,\"caption\":\"Orange digital particles on a black background forming a person marching with a drum.\"},\"datePublished\":\"2022-02-18T03:32:00+00:00\",\"dateModified\":\"2026-01-25T07:53:27+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#webpage\"},\"articleSection\":\"Blogs, Antimalware, Antivirus, Attack, Cyber Criminal, Cyberattack, Hacker, Malware, Ransom, Ransomware, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#listItem\",\"name\":\"Ransomware Comes A&#8217;Marching\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#listItem\",\"position\":3,\"name\":\"Ransomware Comes A&#8217;Marching\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#webpage\",\"url\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching\",\"name\":\"Ransomware Comes A\\u2019Marching \\u00bb Admin By Request\",\"description\":\"March is almost upon us, and at the rate we\\u2019re going, so is another year of ransomware prevailing. Here\\u2019s an update on the ransomware scene so far in 2022 \\u2013 and some predictions for where it\\u2019s headed in the future.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/ABR-Marching-Tech-No-TXT.png\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching\\\/#mainImage\",\"width\":1340,\"height\":662,\"caption\":\"Orange digital particles on a black background forming a person marching with a drum.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/blogs\\\/ransomware-comes-amarching#mainImage\"},\"datePublished\":\"2022-02-18T03:32:00+00:00\",\"dateModified\":\"2026-01-25T07:53:27+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/dedicatedserverabr.kinsta.cloud\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Ransomware Comes A\u2019Marching \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Ransomware Comes A\u2019Marching \u00bb Admin By Request","description":"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.","canonical_url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"antimalware,antivirus,attack,cyber criminal,cyberattack,hacker,malware,ransom,ransomware","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#blogposting","name":"Ransomware Comes A\u2019Marching \u00bb Admin By Request","headline":"Ransomware Comes A&#8217;Marching","author":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/01\/ABR-Marching-Tech-No-TXT.png","width":1340,"height":662,"caption":"Orange digital particles on a black background forming a person marching with a drum."},"datePublished":"2022-02-18T03:32:00+00:00","dateModified":"2026-01-25T07:53:27+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#webpage"},"isPartOf":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#webpage"},"articleSection":"Blogs, Antimalware, Antivirus, Attack, Cyber Criminal, Cyberattack, Hacker, Malware, Ransom, Ransomware, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en#listItem","position":1,"name":"Home","item":"https:\/\/dedicatedserverabr.kinsta.cloud\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#listItem","name":"Ransomware Comes A&#8217;Marching"},"previousItem":{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#listItem","position":3,"name":"Ransomware Comes A&#8217;Marching","previousItem":{"@type":"ListItem","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching\/#organizationLogo"},"image":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/author\/sophie-admin#author","url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#webpage","url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching","name":"Ransomware Comes A\u2019Marching \u00bb Admin By Request","description":"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/#website"},"breadcrumb":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#breadcrumblist"},"author":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/01\/ABR-Marching-Tech-No-TXT.png","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching\/#mainImage","width":1340,"height":662,"caption":"Orange digital particles on a black background forming a person marching with a drum."},"primaryImageOfPage":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching#mainImage"},"datePublished":"2022-02-18T03:32:00+00:00","dateModified":"2026-01-25T07:53:27+00:00"},{"@type":"WebSite","@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/#website","url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Ransomware Comes A\u2019Marching \u00bb Admin By Request","og:description":"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.","og:url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching","og:image":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2022-02-18T03:32:00+00:00","article:modified_time":"2026-01-25T07:53:27+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Ransomware Comes A\u2019Marching \u00bb Admin By Request","twitter:description":"March is almost upon us, and at the rate we\u2019re going, so is another year of ransomware prevailing. Here\u2019s an update on the ransomware scene so far in 2022 \u2013 and some predictions for where it\u2019s headed in the future.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3668","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":[],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 07:54:35","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-05-22 21:59:15","updated":"2026-01-25 07:55:03"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tRansomware Comes A\u2019Marching\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/dedicatedserverabr.kinsta.cloud\/en"},{"label":"Blogs","link":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/category\/blogs"},{"label":"Ransomware Comes A&#8217;Marching","link":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/blogs\/ransomware-comes-amarching"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/posts\/3668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/comments?post=3668"}],"version-history":[{"count":1,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/posts\/3668\/revisions"}],"predecessor-version":[{"id":10680,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/posts\/3668\/revisions\/10680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/media\/7300"}],"wp:attachment":[{"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/media?parent=3668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/categories?post=3668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/tags?post=3668"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/dedicatedserverabr.kinsta.cloud\/en\/wp-json\/wp\/v2\/ppma_author?post=3668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}