Ransomware‑as‑a‑Service, APT Supply‑Chain Resurgence, and AI Phishing Surge
Check Point’s February 2 threat‑intel briefing highlights three converging trends. Ransomware‑as‑a‑Service (RaaS) operations have jumped by over 30 % month‑over‑month, with new affiliate kits offering automated encryption, double‑extortion, and “ransomware‑only” extortion models. At the same time, previously quiet supply‑chain focused APT groups—most notably UNC2452 and APT41—have re‑activated, targeting software vendors and managed‑service providers to embed long‑term footholds. Adding to the pressure, AI‑generated phishing emails are now mimicking legitimate correspondence with a fidelity that evades conventional keyword‑based filters and sandbox detection.
The impact is immediate: organizations face higher ransom demands, broader data‑leak exposure, and a growing attack surface through third‑party software. Defenders must adjust their playbooks—prioritizing rapid identification of RaaS payload signatures, hardening supply‑chain dependencies with strict code‑signing and provenance checks, and deploying AI‑enhanced email security that evaluates linguistic anomalies rather than static rules. Ignoring these trends leaves enterprises vulnerable to faster, more profitable, and harder‑to‑detect attacks.
Categories: Threat Intelligence, Malware & Ransomware, AI Security & Threats
Source: Read original article
Comments ()