Ransomware Groundhog Day: Elevating Your Program in a High-Threat Environment

The latest Kaseya ransomware campaign by the REvil syndicate sounds like cybersecurity groundhog day to business leaders. While Splunk was not impacted by the ransomware attack, as a security leader we want to help the industry by providing tools, guidance and support.

The pace and scale of these attacks continues to increase — and there are several reasons for the acceleration of ransomware. At the highest level, the growing digitization of the economy has made data the universal resource that must be protected to preserve business resiliency. The business landscape has been shifting with the rise of software-as-a-service (SaaS) and the increase of the software supply chain in the last decade. The COVID-19 pandemic also accelerated remote working trends — creating new dimensions to the attack surface area and changing the baseline pattern of life that many security organizations rely on for detection and response.

Attackers took advantage of this shift by exploiting these new threat vectors. First SolarWinds, and now the Kaseya attack, are examples of exploiting highly trusted management software, and the software supply chain, to compromise mission-critical operations and data. Individual groups, like REvil, have layered disruptive innovation into these vectors offering a full stack ransomware-as-a-service (RaaS) capability, complete with installation support and bonus packages, such as programmable outreach with VoIP, scrambling to notify local journalists about an organization’s business compromise in order to escalate the pressure on the victim.

These types of attacks can lead to a flurry of activity and a fair amount of “OMG. DID YOU SEE THIS? HOW CAN WE BE SURE WE ARE NOT NEXT?!” questions from executives. With a rapidly evolving threat landscape and relentlessly innovative attackers, it’s easy to become complacent to the threat and assume resistance is futile. However, there are some real steps business and security leaders can take to improve their defenses.

1. Create a Policy on How You’ll Handle Ransomware Incidents.

The U.S. Department of Homeland Security and the FBI advise all corporations to not pay ransoms. Work with your organization’s board of directors to define how you’ll respond to different ransomware scenarios in a non-emergency environment instead of immediately after a breach.

2. Build Your Intelligence Ecosystem.

In a ransomware event, by the time you know it's happening, it might be too late. We suggest collaborating with sharing communities like Information Sharing and Analysis Centers (ISACs) and Information Sharing and Analysis Organizations (ISAOs). These groups allow you to share (and receive!) tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) between trusted organizations facing the same threats as your business. Faster information sharing will help increase your ability to detect and respond to ransomware — before you start getting skulls and crossbones popping up on your desktops.

3. Shore Up Your Fundamentals.

Ensure you have strong people, process and technology stack for detection and response. Asset management, when performed well via your asset and identity framework, can quickly identify where your vulnerable systems reside. Running regular vulnerability scans will show which systems are vulnerable and can help you prioritize your patching schedule and better focus your detection efforts.

As a security leader, it can be difficult to know and show progress in maturity and performance for your own team and for others in the organization. When fear, uncertainty and doubt is flying, cross-functional and clear communication is critical. This is where metrics like mean-time-to-detect and mean-time-to-respond are a helpful north star. These metrics provide a powerful shorthand for you to communicate your readiness and resilience in terms your peers across the business can understand.

Preventing and detecting ransomware, while also safeguarding your supply chain, will continue to be top of mind as threat actors profit and commandeer data worldwide. Taking a strategic, data-centric approach to the overall issues of ransomware attacks and supply chain threats will help you examine your environment, employ targeted preventative and proactive measures, and streamline security-related communications across your organization. For additional information on all things REvil, read the Splunk's Threat Research Team deep dive to understand how the REvil ransomware is executed in a simulation in REvil Ransomware Threat Research Update and Detections, as well as detection recommendations you can start applying today in Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.