Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Boeing Confirms $200M Cyber Extortion Attempt of LockBit

Boeing Confirms LockBit Attempted $200M Cyber Extortion

Boeing confirmed that the LockBit ransomware gang attack in October 2023, which impacted certain parts and distribution operations of the company, carried a staggering $200 million cyber extortion demand from the cybercriminals, to not publish leaked data. Boeing on Wednesday acknowledged that it is the unnamed “multinational aeronautical and defense corporation headquartered in Virginia,” which is referenced in an unsealed indictment from the U.S. Department of Justice that unmasked the LockBitSupp administrator. Boeing did not provide an immediate response to The Cyber Express' inquiry seeking confirmation of this news, which was initially reported by Cyberscoop. The indictment in question singled out Dmitry Yuryevich Khoroshev as the principal administrator and developer behind the LockBit ransomware operation, as part of a coordinated international effort that included sanctions from the U.S., the U.K., and Australia. Boeing has not provided confirmation on the negotiations and if the company paid any ransom in exchange of the massive $200 million cyber extortion demand.

Boeing Cyber Extortion Saga

LockBit first listed Boeing as its victim on October 27 and set a ransom payment deadline for November 2. Boeing had chosen not to provide any comments or statements regarding the incident, at that time, leaving the LockBit claims unverified. Three days later LockBit took down Boeing’s name from the victims’ list fueling further speculations that it was a hoax or the company likely paid ransom. Following this incident, Boeing eventually confirmed falling victim to LockBit’s cyberattack. But as ransom negotiations reportedly failed, LockBit re-listed Boeing on its leak site and threatened to publish 4 gigabytes of sample data as proof of the Boeing data breach. The post also warned that, “All available data will be published!” in coming days. Following on the threat, LockBit published more than 40GB of data on November 10, as the company likely did not agree to pay the ransom demand. Boeing is yet to address the stolen data publicly.

Ransom Demands Getting Exorbitant

The indictment's reference to the unnamed company highlights the exorbitant ransom demands made by Khoroshev and his cohorts, totaling over $500 million in ransoms extorted from victims since late 2019. Of this, he got nearly $100 million from a 20% share on the ransom payments, which was further “used to continue funding the LockBit operation and its infrastructure.” Ransomware analysts are now calling the Boeing cyber extortion as one of the largest ransom demands from a ransomware gang till date. Researchers suspects LockBit likely made an inflated demand, without realistic expectations of receiving the full amount, merely to test the waters. Between September 2019 and February 2024, Khoroshev grew LockBit into a massive global criminal operation in which along with his affiliates he attacked approximately 2,500 victims, which included nearly 1,800 in the U.S. alone, the indictment said. Apart from Boeing LockBit’s victim list also contains law enforcement agencies, security firms, municipalities, schools, financial institutions and even multinational fast-food chains.

Who is LockBit Ransomware Gang?

The LockBit ransomware gang emerged in 2019, primarily targeting thousands of global companies, with a focus on those headquartered in the United States. Linked to Russian entities, LockBit has amassed tens of millions of dollars in ransom payments since its inception. According to the Cybersecurity and Infrastructure Security Agency (CISA), LockBit has executed over 1700 attacks in the United States, often by compromising and threatening to release sensitive data for financial gain. The recent Boeing data breach highlights the persistent threat posed by cyberattacks to major corporations. LockBit's aggressive tactics and specific targeting of Boeing, a key player in aerospace and defense, highlight the urgent need for robust cybersecurity measures. The ransomware group's imposed deadline heightens the urgency, highlighting the severe consequences of data breaches and the critical importance of safeguarding sensitive information. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

F Society Targets Rutgers University, Bitfinex in Latest Cyberattack

By: Alan J
3 May 2024 at 06:08

F Society Ransomware Group

The F Society ransomware group has listed 4 additional new victims on its leak site. The group's alleged victims include: Bitfinex, Coinmoma, Rutgers University, and SBC Global Net. Bitfinex is a prominent crypto-exchange platform while Coinmoma offers cryptocurrency-related coin, chart and event data. Rutgers University is a public land-grant university operating four campuses in the state of New Jersey. It is one of the oldest operating universities in the United States. SBC Global Net was an email service provided by SBC Communications, which was later acquired by AT&T.

F Society Ransomware Group Shared Alleged Samples

While the attack remains unconfirmed, the ransomware group shared unique descriptions for each victim along with links of sample data obtained from the attacks. The description for each attack included a mention of the total file size of the stolen information and the type of data obtained in the attack. [caption id="attachment_66368" align="alignnone" width="414"] Source: X.com (@AlvieriD)[/caption] Each victim was given 7 days to pay a ransom or threatened with leak of the obtained data. No ransom amount was publicly mentioned. [caption id="attachment_66365" align="alignnone" width="353"]F Society Ransomware Group Rutgers Source: X.com (@AlvieriD)[/caption] The following claim was made about each victim:
  • Bitfinex: The post description stated that the group had stolen 2.5 TB of information and the personal details of 400K users.
  • Rutgers University: The group claimed to have stolen 1 TB of data, while not stating what form of information it had acquired.
  • Coinmoma: The group claimed to have obtained sensitive data including user information and transaction histories. The file was stated to be 2TB in size and consisting of 210k user records.
  • SBC Global Net: The group claimed to have obtained unauthorized access to the victim's system and that they had obtained sensitive data such as personal details of users. The file size was stated at 1 TB in size.
No official responses have been made yet and the claims remain unconfirmed. The Cyber Express Team has reached out to Rutgers University for details about the alleged data breach, however at the time of writing no response was received.

BitFinex Was Previously Hacked

While the F Society ransomware group's claims are unverified, BiFinex had previously fallen victim to a major hacking incident in the past. In the earlier 2016 incident, about 119,754 in bitcoin was stolen from the Bitfinex platform after a hacker breached its systems and initiated about 2,000 unauthorized transactions. The stolen bitcoin was sent to a man, who along with his wife, attempted to launder the money across digital accounts. Law enforcement managed to track the couple after 6 years, and managed to recover more than 94,000 bitcoin that had been stolen from Bitfinex. The total value of the recovered bitcoin was stated at over $3.6 billion at the time of arrest, making it the single largest recovery in the history of the US Department of Justice. However, the perpetrator of the hack is still unknown but is known to have used a data destruction tool to cover their trail. A former FBI agent was quoted as stating that Bitfinex’s earlier security lapse was likely due to its desire to accelerate transactions and thereby raise profits. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Hooker Furniture Faces Potential Data Breach as LockBit Claims Cyberattack

Cyberattack on Hooker Furniture

The LockBit ransomware group, known for its disruptive cyberattacks, is back in the spotlight by claiming a cyberattack on Hooker Furniture. The US-based Hooker Furniture is a prominent player in the furniture industry, known for its designs catering to the hospitality and other sectors.

The LockBit alleges they have exfiltrated customer and business data, setting a deadline of May 08, 2024, to publish the compromised information.

Unverified Cyberattack on Hooker Furniture Claim

The Cyber Express team attempted to reach Hooker Furniture officials for comment, but as of now, there has been no response. The company's website also appears to be functioning normally, raising questions about the legitimacy of the Hooker Furniture cyberattack claim. However, considering LockBit's past activities, complete dismissal would be premature.

LockBit's history of targeting organizations with ransomware attacks further complicates the situation.

In March 2024, the group resurfaced with claims of adding eight new victims to their dark web portal, including prominent companies such as STOCK Development, Smulders, and United Notions Inc. This followed earlier claims of listing 12 new victims on their data leak page and engaging in discussions about seizing their websites.

The resurgence of LockBit comes in the wake of significant law enforcement actions aimed at disrupting the group's operations. In a coordinated effort involving the Department of Justice and international law enforcement agencies, authorities dealt a blow to LockBit's infrastructure. However, the recent claims suggest that the group has adapted and evolved, returning with enhanced techniques and capabilities.

LockBit Resurgence with Enhanced Techniques

In response to the takedown, LockBit administrators released a provocative message, offering insights into their activities and motivations. The message not only highlights the group's defiance but also highlights the challenges faced by law enforcement agencies in combating cybercrime. With attempts to discredit authorities and speculate on the methods of compromise, LockBit's message serves as a reminder of the ongoing battle between cybercriminals and those tasked with enforcing the law. The situation surrounding Hooker Furniture serves as a cautionary tale for businesses worldwide, highlighting the ever-present threat posed by ransomware attacks and the importance of enhanced cybersecurity measures. While the claims made by LockBit remain unverified, the incident highlights the need for vigilance and preparedness in the face of evolving cyber threats. As investigations continue and the deadline looms, all eyes are on Hooker Furniture and its response to the alleged breach. In the meantime, the cybersecurity community remains on high alert, closely monitoring developments and working tirelessly to combat the scourge of ransomware attacks. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Five Families Back? Ransomware Group Claims Attacks on UAE Entities

Five Families

A threat actor group Stormous Ransomware, affiliated with the Five Families alliance, has claimed responsibility for alleged cyberattacks targeting several prominent UAE entities.

The list allegedly includes Bayanat, the sovereign wealth fund's analytics and geospatial intelligence arm; Kids.ae, the government's digital platform for children; the Telecommunications and Digital Regulatory Authority (TDRA); the Federal Authority for Nuclear Regulation (FANR); and the Sharik citizen portal.

[caption id="attachment_66225" align="aligncenter" width="1024"]Five Families Alliance Source: X[/caption]

While Stormous hasn't disclosed details about the nature of the attacks, the data types or size potentially compromised, they've left a message with a link to their blog on the Tor network, urging targets to "stay informed" and offering "more information.

These alleged cyberattacks on UAE entities have heightened anxieties as they suggest potential data leaks if ransom demands aren't met.

[caption id="attachment_66224" align="aligncenter" width="403"]Stormous Ransomware Source: X[/caption]

Five Families Cyberattack Claims

This incident comes on the heels of a much larger cyberattack claim by the Five Families earlier, where they targeted a vast number of UAE entities across various sectors. Governmental and private entities like the Roads and Transport Authority (RTA), the Ministry of Cabinet Affairs, and several ministries were reportedly compromised.

In that alleged cyberattack claim, the group demanded a 150 BTC ransom (approximately $6.7 million USD at today's exchange rate) threatening to leak stolen data if the demands weren't met.

[caption id="attachment_66226" align="aligncenter" width="284"]Cybetattack on UAE Source: X[/caption]

Uncertainties and Potential Implications

The true motives behind these cyberattacks remain unclear. It's possible they're aiming for a significant financial payout, or they may seek to disrupt UAE government operations or damage the country's reputation for digital security. The targeted entities haven't yet released any official statements, leaving the situation shrouded in uncertainty.

If the claims of compromised data are true, this could be the biggest data breach ever witnessed in the UAE and potentially the entire Middle East. The leak of sensitive government or citizen data could have severe consequences, ranging from financial losses to identity theft and national security risks.

Heightened Cybersecurity Measures a Must

This incident highlights the critical need for enhanced cybersecurity measures across all UAE entities, both public and private. Investing in advanced security solutions, implementing stricter data protection protocols, and regularly educating employees on cyber threats are all essential steps to prevent future attacks.

Cybercrime transcends borders. International cooperation between governments and law enforcement agencies is vital to track down these cybercriminals and hold them accountable. Collaborative efforts are crucial for developing effective strategies to combat cyber threats and protect critical infrastructure across the globe.

The coming days will be crucial in understanding the true extent of these alleged cyberattacks on UAE claims and the UAE government's response. While the situation is concerning, a prompt and coordinated effort can help mitigate the damage and enhance the country's digital defenses.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

No MFA, Major Consequences: Simple Security Oversight Led to Change Healthcare Data Breach

Cyberattack on Change Healthcare

CEO Andrew Witty testified before Congress on Wednesday, disclosing a significant cyberattack on Change Healthcare, a subsidiary of UnitedHealth Group. UnitedHealth Group CEO revealed that hackers breached the company's computer system, releasing ransomware after stealing someone's password.

The cybercriminals exploited a portal lacking multifactor authentication (MFA), a basic cybersecurity safeguard.

During an hour-long congressional hearing, Witty informed lawmakers that the company has not yet determined how many patients and healthcare professionals were impacted by the cyberattack on Change Healthcare in February. The hearing, which focused on how hackers gained access to Change Healthcare, a separate division of UnitedHealth, raised questions about the lack of basic cybersecurity measures before the cyberattack. "Change Healthcare was a relatively older company with older technologies, which we had been working to upgrade since the acquisition," Witty explained. But for some reason, which we continue to investigate, this particular server did not have MFA on it.

Multifactor Authentication and Cybersecurity

Multifactor authentication adds a second layer of security to password-protected accounts by requiring users to enter an auto-generated code sent to their phone or email. Despite being a common feature on apps, this safeguard was not in place on the compromised server. Witty assured that all logins for Change Healthcare now have multifactor authentication enabled. The cyberattack on Change Healthcare was attributed to the Russia-based ransomware gang ALPHV or BlackCat. The group claimed responsibility for the cyberattack, alleging it stole more than six terabytes of data, including "sensitive" medical records. The attack caused a disruption of payment and claims processing across the country, stressing doctor's offices and healthcare systems by interfering with their ability to file claims and get paid. UnitedHealth paid a $22 million ransom in Bitcoin to BlackCat, a decision made by Witty himself. However, despite the ransom payment, some sensitive records from patients were still posted by hackers on the dark web. The ransom payment was one of the hardest decisions I've ever had to make and I wouldn't wish it on anyone," Witty stated.

Scope of the Cyberattack on Change Healthcare and Financial Impact

Change Healthcare processes 15 billion transactions a year, according to the American Hospital Association, meaning that even patients who weren't customers of UnitedHealth were potentially affected. The company revealed earlier this month that personal information covering a "substantial portion of people in America" may have been taken in the attack. The breach has cost UnitedHealth Group nearly $900 million, excluding the ransom paid, according to company officials in the first-quarter earnings report last week.

Rising Threat of Ransomware Attacks

Ransomware attacks have become increasingly common within the healthcare industry. According to a 2022 study published in JAMA Health Forum, the annual number of ransomware attacks against hospitals and other healthcare providers doubled from 2016 to 2021. This escalation in cyber threats highlights the urgent need for enhanced cybersecurity measures across the industry.

The breach at Change Healthcare echoes a similar incident in March 2024, where Refuah Health Center faced a cyberattack due to the lack of MFA. The New York Attorney General's office intervened, resulting in a $1.2 million investment by Refuah in enhancing cybersecurity measures. The health center also agreed to pay $450,000 in penalties and costs, resolving allegations of inadequate cybersecurity controls.

Prioritizing Cybersecurity in Healthcare Both incidents highlight the critical importance of implementing strong cybersecurity measures, especially in the healthcare sector. With patient data at stake, organizations must invest in multifactor authentication and other advanced security protocols to safeguard sensitive information. As cyber threats continue to evolve, proactive measures are essential to protect the privacy and security of patient data. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Ransomware Group LockBit Claims Responsibility for Cannes Hospital Cyberattack

By: Alan J
30 April 2024 at 05:10

Cannes Hospital Attack stock

The LockBit ransomware group has allegedly claimed responsibility for an earlier Cannes Hospital cyberattack impacting the Cannes Simone Veil Hospital Center (Centre Hospitalier de Cannes). The Cannes Simone Veil Hospital Center, also known as the Broussailles Hospital, was named after former French health minister Simone Veil. The hospital offers patient facilities such as anesthesia, surgery, ENT, ophthalmology, dentistry, mental health, and senior care. While the hospital was immediate in implementing stringent containment measures, ongoing investigations did not find evidence of data theft or direct ties to any threat actor groups.

Staff Forced to Degrade Services After Cannes Hospital Cyberattack

After the cyberattack, medical professionals were forced to switch to pen, paper, and manual processes to continue to provide essential healthcare services such as emergency care, surgery, obstetrics, and pediatrics to patients. Telephony services continue to work normally. Even weeks after the attack, the site still maintains a notice of the cybersecurity attack. The notice reads that the hospital staff is investigating the cyberattack in conjunction with experts (ANSSI, Cert Santé, Orange CyberDéfense, GHT06). Further, the notice stated that while the investigation remains ongoing, there have not yet been any ransom demands or identification of data theft operations. [caption id="attachment_65802" align="alignnone" width="683"]Cannes Hospital Attack Source: ch-cannes.fr[/caption] Cybersecurity analyst Dominic Alvieri, on X(Twitter), shared an alleged LockBit claim of responsibility for the earlier incident. [caption id="attachment_65735" align="alignnone" width="1200"]Cannes Hospital Attack (Source: Dominic Alvieri/ @AlvieriD / x.com)[/caption] If the claims are true, the Cannes Simone Veil Hospital Center would be one of the latest victims in a series of recent cyberattacks claimed by LockBit after the ransomware group's operations were disrupted following joint-effort action from the FBI, NCA the UK, and the Europol.

LockBit Ransomware Group Apologised for Earlier Cyberattack on Children's Hospital

Since healthcare targets remain a sensitive target for cyberattacks, many threat actor groups have made claims or suggested they would avoid such targets in their operations. During the Covid-19 pandemic, the Maze ransomware group announced that they would not target healthcare organizations. Later the group was found to continue targeting healthcare units in its operations. Last year in January 2023, LockBit apologized for an attack on Toronto's Hospital for Sick Children, blamed a partner for the attack, in its data leak site, claiming to have blocked the partner allegedly responsible for the attack, and offered code to restore the affected systems. The cyberattack had significant consequences for the pediatric firm such as delayed lab and imaging results, shut down of phone lines, and the staff payroll system. These incidents highlight that the healthcare system remains vulnerable to cyberattacks and can prove to have unwelcome effects on patient health, staff functioning, and morale. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Hunters Ransomware Claims Two: Rocky Mountain Sales, SSS Australia Targeted

Hunters Group

The notorious Hunters group has allegedly added two new victims to their dark web portal: Rocky Mountain Sales in the United States and SSS Australia. While the extent of the cyberattack, data compromise, and motive behind the attack remain undisclosed by the ransomware group, the implications of such an attack on these prominent organizations could be far-reaching.

Rocky Mountain Sales, Inc., with a revenue of US$5 million, is an outsourced sales and service organization committed to providing leading customer service, sales, and support to all strategic partners. Meanwhile, SSS Australia, boasting a revenue of US$17 million, has been synonymous with the highest standards of quality and value in medical supplies for over 45 years. Given the vastness of these organizations, if the cyberattack on Rocky Mountain Sales and cyberattack on SSS Australia claim is proven true, the consequences could be severe. Not only could it disrupt their operations, but it could also result in substantial financial losses, tarnishing their reputations and undermining customer trust. The potential compromise of sensitive data, such as customer information, financial records, and proprietary business data, could have long-lasting repercussions for both organizations. However, as of now, no foul play can be sensed upon accessing the official websites of both organizations, as they were fully functional. To verify the claim further, The Cyber Express team reached out to officials, but as of writing this news report, no official response has been received, leaving the claim unverified.

Hunters International Ransomware Group's Previous Claims

This recent incident follows a string of cyberattacks by the Hunters International group. In April, SpaceX, the aerospace manufacturer and space transport services company founded by Elon Musk, allegedly suffered a cybersecurity incident involving a data breach by the Hunters group, who reportedly posted samples of the breached data. Prior to that, Central Power Systems & Services, a major distributor of industrial and power generation products in Kansas, Western Missouri, and Northern Oklahoma, fell victim to the notorious ransomware group. Before these incidents, the group targeted various organizations across different sectors and countries. In 2024 alone, the Hunters International group claimed responsibility for cyberattacks on the Dalmahoy Hotel & Country Club in the UK, Double Eagle Energy Holdings IV, LLC in the US, and Gallup-McKinley County Schools in New Mexico, among others. The cyberattacks by the Hunters International group highlight the need for organizations to prioritize cybersecurity measures and invest in strong defense mechanisms to safeguard their digital assets. Moreover, international cooperation and information sharing among cybersecurity agencies are crucial in combating such threats effectively.

Unverified Hunters Group Claims

While the Hunters International group has claimed responsibility for the cyberattacks on Rocky Mountain Sales and SSS Australia, the lack of verified information about the extent of the attacks emphasizes the challenges in responding to such incidents. Without official confirmation or detailed information from the targeted organizations, the full impact of the cyberattacks remains uncertain. As cybersecurity threats continue to evolve and ransomware attacks become increasingly sophisticated, organizations must remain vigilant and proactive in protecting their networks and data. The recent incidents involving Hunters International serve as a reminder of the potential consequences of inadequate cybersecurity measures. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Moldova Government Hit by NoName Ransomware: Websites Down

NoName Ransomware Group

The notorious NoName ransomware group this time has allegedly set its sights on Moldova, targeting key government websites in what appears to be a strategic cyberattack. The recent alleged cyberattack on Moldova digital infrastructure has raised concerns over cybersecurity and geopolitical tensions in the region.

The reportedly affected entities in Moldova include vital governmental organs such as the Presidency, Ministry of Foreign Affairs, Ministry of Internal Affairs, and the State Registry, among others. The Moldova cyberattack has left these websites inaccessible, displaying the ominous message, "This Site Can't be Reached. NoName ransomware group

Political Motives Behind the Cyberattack on Moldova

Although the extent of the cyberattack and the motive behind it have not been explicitly disclosed by the NoName group, a message left by the hackers hints at a political agenda. We continue to send DDoS greetings to the State website of Moldova in order to discourage the local government from craving for Russophobia," the message reads. This suggests a possible attempt to influence Moldova's foreign policy by targeting its digital infrastructure. [caption id="attachment_65468" align="aligncenter" width="531"]NoName ransomware group Source: X[/caption] The implications of such cyberattacks on Moldova could be profound, affecting not only the government's operations but also the country's stability and security. The ongoing tension between Moldova and Russia adds another layer of complexity to the situation, raising concerns about the potential involvement of state-sponsored actors behind the cyber assault. [caption id="attachment_65469" align="aligncenter" width="528"]Cyberattack on Moldova Source: X[/caption]

NoName Ransomware Group Track Record

This is not the first time NoName has launched such attacks. In March 2024, the group claimed responsibility for targeting multiple websites in Denmark, including key entities like Movia, Din Offentlige Transport, the Ministry of Transport, Copenhagen Airports, and Danish Shipping. Similarly, in January of the same year, NoName targeted high-profile websites in the Netherlands, including OV-chipkaart, the Municipality of Vlaardingen, the Dutch Tax Office (Belastingdienst), and GVB.

Moreover, NoName's recent cyber onslaught on Finland has further escalated concerns. The Finnish government organizations, including Traficom, the National Cyber Security Centre Finland (NCSC-FI), The Railways, The Agency for Regulation and Development of Transport and Communications Infrastructure of Finland, and several subdomains of the Finnish Road Agency, faced temporary inaccessibility due to DDoS attacks. The sophistication and scale of NoName's operations, combined with their apparent political motives, highlight the urgent need for enhanced cybersecurity measures and international cooperation. The rising frequency of cyberattacks targeting governmental institutions across Europe demands a coordinated response from both national and international cybersecurity agencies. Furthermore, these incidents serve as a wake-up call for governments worldwide to prioritize cybersecurity and invest in strong defense mechanisms to safeguard their digital assets. The increasing sophistication of cybercriminals, coupled with geopolitical tensions, highlights the need for proactive measures to protect critical infrastructure and ensure the integrity of government operations. As the investigation into the recent cyberattack on Moldova unfolds, the international community will be closely monitoring the situation, with a keen eye on the implications for regional security and the broader cybersecurity landscape. In an era where cyberspace knows no borders, collective action and cooperation are essential to effectively combat the growing threat of cyber warfare and ransomware attacks. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

CISA Launches Ransomware Vulnerability Warning Pilot to Protect Critical Infrastructure

Ransomware Vulnerability Warning Pilot

In response to this growing threat, the Cybersecurity and Infrastructure Security Agency (CISA) has launched the Ransomware Vulnerability Warning Pilot (RVWP). This initiative focuses on proactive risk reduction through direct communication with the federal government, state, local, tribal, territorial (SLTT) government, and critical infrastructure entities. The goal is to prevent threat actors from accessing and deploying ransomware on their networks.

Ransomware, a persistent threat to critical services, businesses, and communities worldwide, continues to evolve, causing costly and disruptive incidents. Recent industry reports estimate that businesses spend an average of $1.85 million to recover from a ransomware attack.

Moreover, a staggering 80% of victims who paid a ransom were targeted again by these criminals. The economic, technical, and reputational impacts of ransomware incidents pose significant challenges for organizations large and small.

CISA's Ransomware Vulnerability Warning Pilot 

Aligned with the Joint Ransomware Task Force, RVWP provides timely notifications to critical infrastructure organizations, allowing them to mitigate vulnerabilities and protect their networks and systems. By leveraging existing services, data sources, technologies, and authorities, CISA aims to reduce the attack surface and impact of ransomware attacks. A key component of Pilot is the Cyber Hygiene Vulnerability Scanning service, which monitors internet-connected devices for known vulnerabilities. This service, available to any organization, has proven highly effective in reducing risk and exposure. Organizations typically see a 40% reduction in risk within the first 12 months, with most experiencing improvements within the first 90 days. By identifying exposed assets and vulnerabilities, Cyber Hygiene Vulnerability Scanning helps organizations manage risks that would otherwise go unnoticed. Specifically for Pliot, this service notifies organizations of vulnerabilities commonly associated with ransomware exploitation.

The Success of RVWP in 2023

In Calendar Year (CY) 2023, RVWP completed 1,754 notifications to entities operating vulnerable internet-connected devices. Following these notifications, CISA conducted regular vulnerability scans to assess mitigation efforts. Of the 1,754 notifications, 49% of vulnerable devices were either patched, implemented compensating controls, or taken offline after CISA's intervention. CISA's regional teams collaborate closely with notified entities to ensure timely mitigation efforts, enhancing the overall effectiveness of the Ransomware Vulnerability Warning Pilot. RVWP enables organizations across critical infrastructure sectors to strengthen their networks against known ransomware vulnerabilities. By reducing the effectiveness of ransomware tools and procedures, Pliot increases operational costs for ransomware gangs and contributes to deterrence by denial.

Taking Action to #StopRansomware

CISA urges organizations to take proactive measures to protect against ransomware. These measures can include:
  1. Enroll in CISA Cyber Hygiene Vulnerability Scanning: This no-cost service helps organizations raise their cybersecurity posture and reduce business risk by identifying and mitigating vulnerabilities.
  2. Review the #StopRansomware Guide: Utilize the valuable checklist on how to respond to a ransomware incident and protect your organization.
  3. Report Ransomware Activity: Always report observed ransomware activity, including indicators of compromise and tactics, techniques, and procedures (TTPs), to CISA and federal law enforcement partners.
By partnering with CISA and implementing these measures, organizations can effectively combat ransomware and safeguard their digital assets and future. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

St-Jerome Company Targeted in Alleged Ransomware Attack by Everest Group

Cyberattack on Les Miroirs St-Antoine

The infamous Everest ransomware group has struck again, this time targeting Les Miroirs St-Antoine Inc., a longstanding company based in the St-Jérôme region. As of now, the extent of the data breach, the level of data compromise, and the motive behind the cyberattack on Les Miroirs St-Antoine remain undisclosed by the ransomware group.

Founded in 1956, Les Miroirs St-Antoine is a family-owned business specializing in the design, manufacturing, installation, and repair of glazing and aluminum products for commercial, industrial, and institutional sectors. However, the company is now facing allegedly the daunting challenge of navigating the aftermath of this Les Miroirs St-Antoine cyberattack.

Cyberattack on Les Miroirs St-Antoine Remains Unverified

The Everest ransomware group has issued a chilling ultimatum, stating that Les Miroirs St-Antoine Inc. has 24 hours to contact them using the provided instructions. Failure to comply will result in the publication of all stolen data. "Company has the last 24 hours to contact us using the instructions left. In case of silence, all data will be published here," reads the post by Everest ransomware group. This tactic, known as double extortion, is characteristic of the group's modus operandi. [caption id="attachment_65194" align="aligncenter" width="1024"]Cyberattack on Les Miroirs St-Antoine Source: X[/caption] To investigate further, The Cyber Express Team (TCE) attempted to access Les Miroirs St-Antoine's official website and found it fully functional, indicating no immediate visible signs of compromise. However, this does not discount the possibility of covert access to sensitive company data. TCE has reached out to company officials for clarification but has yet to receive an official response. The Everest ransomware group has been a prominent threat in the cybersecurity landscape since December 2020. Operating primarily in Russian-speaking circles, the group targets organizations across various industries and regions, with high-profile victims including NASA and the Brazilian Government.

The Persistent Threat of Everest Ransomware

Known for its sophisticated data exfiltration techniques, Everest ransomware often demands a ransom in exchange for not only decrypting the victim's files but also for refraining from releasing stolen information to the public. This approach maximizes pressure on victims to pay up, as the consequences of data exposure can be severe. Experts have linked Everest ransomware to other notorious cyber threats, such as the Everbe 2.0 and BlackByte families. The group employs a range of tactics, including leveraging compromised user accounts and exploiting Remote Desktop Protocol (RDP) for lateral movement within targeted networks. The Everest ransomware's reach extends beyond private corporations, as they have also targeted government offices in various countries, including Argentina, Peru, and Brazil. This demonstrates the group's audaciousness and their willingness to target entities regardless of their size or prominence. The cyberattack on Les Miroirs St-Antoine Inc. highlights the urgent need for organizations to enhance their cybersecurity defenses. This includes implementing strong security measures, conducting regular vulnerability assessments, and providing comprehensive employee training to mitigate the risk of human error. Furthermore, proactive monitoring and threat intelligence sharing among organizations can help identify and respond to potential cyber threats more effectively. Collaboration between the public and private sectors is essential in combating cybercriminals like the Everest ransomware group. In conclusion, the ransomware attack on Les Miroirs St-Antoine Inc. serves as a reminder of the ever-present threat posed by cybercriminals. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Ransomware Group BlackBasta Targets TRUE Solicitors

cyberattack on TRUE Solicitors

TRUE Solicitors LLP, a prominent law firm based in the UK specializing in personal injury claims and employment law, has fallen victim to an alleged cyberattack by the notorious BlackBasta ransomware group. The ransomware group announced the cyberattack on TRUE Solicitors but provided no further details regarding the extent of the breach or the compromised data.

TRUE Solicitors LLP is renowned for its dedicated team of solicitors who provide high-quality legal representation to clients seeking compensation for personal injuries and assistance with various legal matters.

Cyberattack on TRUE Solicitors: Unverified

To verify the claim made by the BlackBasta ransomware group, The Cyber Express Team attempted to access the official website of TRUE Solicitors LLP. However, the website was found to be fully operational, casting uncertainty on the authenticity of the ransomware group's announcement. Until an official statement is released by the firm, the truth behind the TRUE Solicitors cyberattack claim remains elusive. This is not the first time the BlackBasta ransomware group has made headlines. In 2024, the group targeted Leonard’s Syrups, a cherished family-owned beverage company in Michigan. The cyberattack on Leonard’s Syrups, announced on a dark web forum, left many questions unanswered, with crucial details about the breach, compromised data, and motives withheld by the cybercriminals. In another incident, the BlackBasta ransomware group claimed two new victims: Southern Water and Asahi Glass Co. While details about the extent of the attacks, compromised data, and motives remain undisclosed, the urgency of the situation is highlighted by the ransomware group's ominous deadline for data exposure.

Implications of TRUE Solicitors Cyberattack

If the claim made by the BlackBasta ransomware group regarding the cyberattack is proven true, the implications could be significant. The compromise of sensitive legal information and client data could have far-reaching consequences, not only for the firm but also for its clients and partners. As investigations into the cyberattack on TRUE Solicitors LLP continue, stakeholders await an official statement from the firm regarding the breach and its impact. Until then, the industry remains on high alert, bracing for potential fallout from yet another audacious move by the BlackBasta ransomware group. Only time will tell whether the claim is true or if it is another attempt by cybercriminals to sow fear and uncertainty. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

RansomHouse on the Move Again: Hirsh Industries Latest Target

Cyberattack on Hirsh Industries

Hirsh Industries, a leading manufacturer and supplier of metal filing, storage, and organizational products, has been targeted by the RansomHouse ransomware group. The cyberattack on Hirsh Industries, disclosed by the ransomware group, has raised concerns about the safety of sensitive data and the potential impact on the company's operations. Hirsh Industries, LLC, known for its metal filing and storage solutions, caters to both personal and commercial needs. With a revenue of $162.1 million, the company holds a significant position in the industry.

Unverified: Cyberattack on Hirsh Industries

While the claim by the RansomHouse ransomware group has been made, no further details have been disclosed regarding the extent of the data breach or the motives behind the cyberattack. Upon accessing the official website, no signs of foul play were detected, as the website appeared to be fully functional. To validate the Hirsh Industries cyberattack claim, The Cyber Express Team reached out to company officials, but as of writing this report, no official response has been received. The attack on Hirsh Industries marks yet another addition to the growing list of attacks attributed to the RansomHouse ransomware group.

RansomHouse Previous Attacks

In April 2024, the group targeted Bank Pembangunan Daerah Banten Tbk, a regional development bank in Indonesia. While the full extent of the cyberattack on the bank remains undisclosed, the implications could be significant, given its focus on micro-enterprises and SMEs. Earlier in the same month, Lopesan Hotels fell victim to a RansomHouse attack, with the group claiming to have obtained 650GB of sensitive data, including hotel revenue and employee information. In February, Webber International University and GCA Nederland were targeted by the RansomHouse group, adding to their list of victims on the dark web portal. The alleged attack on Hirsh Industries by the RansomHouse ransomware group highlights the increasing threat posed by such groups to organizations worldwide. While the authenticity of the claim remains unverified, the incident serves as a wake-up call for businesses to bolster their cybersecurity defenses. With Hirsh Industries being a significant player in the industry, the implications of the cyberattack, if proven true, could be far-reaching. The compromise of sensitive data could not only affect the company's operations but also raise concerns among its clients and partners. Additionally, the potential financial losses and reputational damage could be substantial. As investigations into the Hirsh Industries cyberattack continue, stakeholders await an official response from the company regarding the breach and its impact. Meanwhile, businesses are urged to prioritize cybersecurity measures to mitigate the risk of falling victim to ransomware attacks. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Central Power Systems & Services’ Website Down After Alleged Hunters Group Cyberattack

Cyberattack Central Power Systems

Central Power Systems & Services, a major distributor of industrial and power generation products in Kansas, Western Missouri, and Northern Oklahoma, has fallen victim to the notorious Hunters Ransomware Group.

The cyberattack on Central Power Systems & Services, disclosed by the ransomware group, has raised concerns about the safety of sensitive data and the integrity of critical infrastructure.

Central Power Systems & Services, the sole authorized distributor for Allison Transmissions, Detroit Diesel, MTU, Doosan, and Liebherr in the region, has been a stalwart in serving commercial equipment needs since 1954. However, the recent alleged cyberattack may have halted its official website as it displayed a disconcerting message: "Sorry you have been blocked. You are unable to access cpower.com."

Uncertainty About Cyberattack on Central Power Systems & Services 

The claim by the Hunters Ransomware Group has yet to be officially confirmed, leaving both the company and its clients in a state of uncertainty. While attempts to access the website raise suspicions, the possibility of a technical glitch cannot be ruled out until an official statement is released. If proven true, the implications of this Central Power Systems & Services cyberattack could be significant. The potential compromise of sensitive data poses a serious threat not only to the company but also to its clients and partners. With no details provided by the ransomware group regarding the extent of the breach or the nature of compromised data, the situation remains tense.

Previous Incidents

This is not the first time the Hunters Ransomware Group has made headlines. Before this, the group targeted various organizations across different sectors and countries. In 2024 alone, the group claimed responsibility for cyberattacks on the Dalmahoy Hotel & Country Club in the UK, Double Eagle Energy Holdings IV, LLC in the US, and Gallup-McKinley County Schools in New Mexico, among others. The modus operandi of the Hunters Ransomware Group involves encrypting files and appending the ".LOCKED" extension, followed by demands for ransom in exchange for decryption keys. Additionally, the group often leaves instructions for negotiation in files named "Contact Us.txt" within compromised directories. The cyberattack on Central Power Systems & Services highlights the growing threat posed by ransomware groups to organizations worldwide. With cybercriminals continuously evolving their tactics and targeting critical infrastructure, businesses must remain vigilant and prioritize cybersecurity measures. As the investigation into this cyberattack continues, stakeholders await an official statement from the company regarding the breach and its impact. Until then, the industry remains on high alert, bracing for potential fallout from yet another audacious move by the Hunters Ransomware Group. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Cactus Ransomware Hits Singapore Garment Giant Ghim Li Global

Cactus Ransomware Hits Singapore Garment Giant Ghim Li Global

Cactus ransomware has added Ghim Li Global Pte Ltd to its victim list, sparking concerns over data security and the vulnerability of businesses to cyberattacks.

Ghim Li Global is a prominent Singapore-based company specializing in garment manufacturing and distribution across the Asia-Pacific region.

While the extent of the Ghim Li Global cyberattack and the compromise of data remain undisclosed by the ransomware group, the potential implications of such an attack could be profound.

Claim of Ghim Li Global Cyberattack

The ransomware group's claim has raised skepticism, especially as Ghim Li Global's official website appears to be fully functional, casting doubts on the authenticity of the claim. Despite attempts to verify the Ghim Li Global cyberattack, no official response has been received from the company, leaving the claim unverified.

[caption id="attachment_64590" align="aligncenter" width="908"]Ghim Li Global cyberattack Source: X[/caption]

Emergence of Cactus Ransomware

Cactus ransomware has been a growing threat since March 2023, targeting commercial entities with considerable success. In a study conducted by the SANS Institute on the growth of ransomware, Cactus was identified as one of the fastest-growing threat actors of the year. Notably, 17% of all ransomware attacks in 2023 were attributed to new groups that did not exist in 2022, with Cactus ranking among the top five threats in this new group of threat actors. The name "Cactus" originates from the filename of the ransom note, "cAcTuS.readme.txt", with encrypted files being renamed with the extension.CTSx, where 'x' is a single-digit number that varies between attacks.

Previous Cyberattacks Claims

Prior to targeting Ghim Li Global, Cactus ransomware made headlines in March 2024 for its cyberattack on Petersen Health Care. The attack compromised the company's digital infrastructure and led to the exposure of sensitive information. Petersen Health Care, a prominent Illinois-based company operating a network of nursing homes across the United States, was forced to file for bankruptcy under Chapter 11 protection in a Delaware court, burdened by a staggering $295 million in debt. Among this debt was a significant $45 million owed under healthcare facility loans insured by the U.S. Department of Housing and Urban Development. In February, Schneider Electric's Sustainability Business Division fell victim to a data breach, raising alarms about the security of sensitive information within the company's ecosystem. While details of the breach remain murky, the the ransomware group claimed responsibility, asserting that 1.5 TB of personal documents, confidential agreements, and non-disclosure agreements were among the information stolen. Before these incidents, in December, Cactus ransomware targeted Coop, a major supermarket chain in Sweden. Despite claiming responsibility for the attack, the group did not disclose the extent of the data accessed or the ransom amount demanded. Subsequently, in January 2024, Coop confirmed facing a severe cyberattack that rendered its payment checkouts useless, plunging the supermarket giant into chaos. With the alleged cyberattack on Ghim Li Global Pte Ltd, the ransomware group continues to pose a significant threat to organizations worldwide. The incident highlights the urgent need for businesses to strengthen their cybersecurity measures and remain vigilant against evolving cyber threats. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

RansomHouse Strikes Again: Banten Regional Development Bank Tbk Targeted

RansomHouse Cyberattack

RansomHouse, a notorious ransomware group, has struck again. This time, their alleged target is the Bank Pembangunan Daerah Banten Tbk, a regional development bank owned by the government of Banten province, Indonesia.

While the full extent of the cyberattack on Banten Regional Development Bank remains undisclosed, the implications could be significant given the nature of the institution and its focus on micro-enterprises and small and medium enterprises (SMEs).

The claim made by RansomHouse regarding the cyberattack on Banten Regional Development Bank raises serious concerns about data security and the vulnerability of financial institutions to cyber threats.

Implications of Cyberattack on Banten Regional Development Bank

With a reported revenue of $27 million, the potential impact of such an attack could be far-reaching, not only in terms of financial losses but also in terms of customer trust and market stability. [caption id="attachment_64561" align="aligncenter" width="586"]RansomHouse Strikes Again Source: X[/caption] However, the authenticity of the ransomware group claim remains uncertain. Despite the announcement of the Banten Regional Development Bank cyberattack by the ransomware group, the bank's official website appears to be fully functional, raising doubts about the validity of the ransomware group's assertion. The lack of an official response from the bank further complicates the matter, leaving the claim unverified.

RansomHouse: Modus Operandi

RansomHouse, which emerged in March 2022, is known for its multi-pronged extortion tactics. Unlike traditional ransomware groups, RansomHouse claims to focus solely on extortion, threatening to publicly disclose stolen data rather than encrypting it. This modus operandi is designed to maximize pressure on victims to pay the ransom. The group portrays itself as a 'force for good', aiming to expose companies' vulnerabilities and shortcomings. The group primarily targets large enterprises and high-value entities through phishing and spear-phishing emails. They often utilize sophisticated third-party frameworks like Vatet Loader, Metasploit, and Cobalt Strike to infiltrate their targets' networks. This ransomware group typically demands payment in Bitcoin, enhancing the anonymity of transactions and making it difficult for law enforcement agencies to track.

Recent Claims by RansomHouse

This recent cyberattack on Banten Regional Development Bank follows a pattern of similar incidents targeting prominent organizations. In April, RansomHouse allegedly targeted Lopesan Hotels, claiming to have obtained sensitive data amounting to 650GB, including details of hotel revenue and employee information. Before that, in February, the group targeted Webber International University and GCA Nederland, adding them to their list of victims on the dark web portal. The rise of ransomware attacks highlights the urgent need for organizations to strengthen their cybersecurity measures. With cybercriminals becoming increasingly sophisticated, traditional security protocols may no longer be sufficient to defend against such threats. For financial institutions like Banten Regional Development Bank, protecting sensitive customer data is paramount. Beyond financial losses, a cyberattack can severely damage a bank's reputation and erode customer trust. Therefore, investing in cybersecurity should be a top priority for such organizations. In conclusion, the alleged cyberattack on Banten Regional Development Bank by Ransomware group underlines the growing threat posed by ransomware groups to organizations worldwide. While the authenticity of the claim remains unverified, the incident serves as a wake-up call for businesses to enhance their cybersecurity defenses. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

UnitedHealth Confirms Paying Ransom to Secure Patient Data After Change Healthcare Cyberattack

Change Healthcare Cyberattack

In a bid to safeguard patient data, UnitedHealth Group, a prominent healthcare conglomerate, confirmed that it has paid ransom to cyberthreat actors after its subsidiary, Change Healthcare, fell victim to a cyberattack in February. The company also acknowledged that files containing personal information were compromised in the Change Healthcare cyberattack.

According to a statement provided to CNBC, UnitedHealth stated, “This attack was conducted by malicious threat actors, and we continue to work with law enforcement and multiple leading cybersecurity firms during our investigation. A ransom was paid as part of the company’s commitment to do all it could to protect patient data from disclosure.”

Ransom Payment Amount And Method

Though the exact ransom amount was not disclosed by UnitedHealth, Wired magazine reported on March 4 that the company likely paid around $22 million in bitcoin to the attackers, citing darknet forum posts and blockchain analysis. The Cyber Express Team contacted Change Healthcare officials to inquire about the reported ransom payment. However, at the time of publication, no official response has been received. UnitedHealth further disclosed that cyberthreat actors accessed files containing protected health information (PHI) and personally identifiable information (PII). The breached files could potentially affect a significant portion of the American population. However, the company clarified that, to date, there is no evidence of exfiltration of materials such as doctors’ charts or full medical histories among the compromised data. "Based on initial targeted data sampling to date, the company has found files containing protected health information (PHI) or personally identifiable information (PII), which could cover a substantial proportion of people in America. To date, the company has not seen evidence of exfiltration of materials such as doctors’ charts or full medical histories among the data," reads the official release. Andrew Witty, CEO of UnitedHealth Group, expressed the company’s commitment to addressing the concerns raised by the attack, stating, “We know this attack has caused concern and been disruptive for consumers and providers, and we are committed to doing everything possible to help and provide support to anyone who may need it.”

Change Healthcare Cyberattack Details and Infiltration

The attackers, identified as the ALPHV ransomware gang or one of its affiliates, infiltrated Change Healthcare’s networks more than a week before launching the ransomware strike, as reported by The Wall Street Journal. They gained entry through compromised credentials on an application that allows staff to remotely access systems, as multifactor authentication protocols were not enabled on this particular application. In response to the breach, UnitedHealth has taken steps to mitigate the impact on affected individuals. The company has set up a dedicated website for patients to access resources and launched a call center offering free identity theft protection and credit monitoring for two years. However, due to the ongoing complexity of the data review, the call center is unable to provide specific details about individual data impact. Change Healthcare, which processes approximately 15 billion transactions a year and handles one in three medical records, suffered significant disruption from the attack. More than 100 systems were shut down, affecting numerous healthcare providers and leaving some reliant on loans and personal funds to stay operational. UnitedHealth reported that the attack has cost the company $872 million so far.

Recovery Efforts and Assistance Programs

Despite the challenges, UnitedHealth has been steadily restoring systems since March, including pharmacy software, claims management, and other platforms. The company has also launched financial assistance programs, although some providers have expressed dissatisfaction with the amounts offered and reported feeling pressured to make positive public comments about the loans by UnitedHealth staff. As UnitedHealth continues its efforts to recover from the cyberattack, it remains vigilant in ensuring the security of patient data and strengthening its cybersecurity defenses to prevent future incidents. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Akira Ransomware Group Amasses $42 Million from Over 250 Global Attacks, FBI Warns

Akira ransomware group

The Akira ransomware group has been identified as the culprit behind a series of cyberattacks targeting businesses and critical infrastructure entities across North America, Europe, and Australia. According to the latest advisory by the U.S. Federal Bureau of Investigation (FBI), since March 2023, the Akira ransomware group has successfully breached over 250 organizations, amassing a staggering $42 million in ransomware payments. Initially focusing on Windows systems, Akira's tactics have recently expanded to include Linux variants, intensifying concerns among global cybersecurity agencies. The FBI, in collaboration with key players such as the Cybersecurity and Infrastructure Security Agency (CISA), Europol's European Cybercrime Centre (EC3), and the Netherlands' National Cyber Security Centre (NCSC-NL), has issued a joint advisory on Akira ransomware to raise awareness and disseminate crucial threat information.

The Hidden Modus Operandi of the Akira Ransomware Group

The FBI revealed the modus operandi of the Akira ransomware group that involves a multi-faceted approach to infiltrate and compromise targeted organizations. Leveraging vulnerabilities in Cisco systems, particularly CVE-2020-3259 and CVE-2023-20269, Akira actors exploit weaknesses in virtual private networks (VPNs) lacking multifactor authentication (MFA), alongside other entry points such as Remote Desktop Protocol (RDP) and spear phishing. Once inside the network, Akira operatives establish persistence by creating new domain accounts and employing post-exploitation techniques like credential scraping and credential scraping tools like Mimikatz and LaZagne. This enables them to escalate privileges and navigate the network undetected, utilizing reconnaissance tools like SoftPerfect and Advanced IP Scanner to map out the infrastructure. Moreover, the threat actor has evolved over the years and has been using multiple ransomware variants “against different system architectures within the same compromise event”. This strategy differs from what was previously reported in the Akira affiliate partners and their hacking processes.  “Akira threat actors were first observed deploying the Windows-specific “Megazord” ransomware, with further analysis revealing that a second payload was concurrently deployed in this attack (which was later identified as a novel variant of the Akira ESXi encryptor, “Akira_v2”)”, says the FBI.

Defense Evasion, Encryption and Mitigation

Apart from upgrades in its offensive side, the Akira ransomware group has next-gen stealth to evade detection. The group, according to the FBI, has been deploying a variety of tactics, including disabling security software and deploying multiple ransomware variants simultaneously.  The ransomware encryption process is sophisticated, employing a hybrid encryption scheme combining ChaCha20 stream cipher with RSA public-key cryptosystem, tailored to file types and sizes. Encrypted files are marked with either a .akira or .powerranges extension, with the ransom note strategically placed in directories. In response to the threat posed by Akira ransomware, cybersecurity authorities like CISA advocate for proactive measures to mitigate risks and enhance organizational resilience. Recommendations include implementing multifactor authentication, maintaining up-to-date software patches, segmenting networks, and employing robust endpoint detection and response (EDR) tools. Furthermore, organizations are advised to conduct regular audits of user accounts, disable unused ports, and enforce the principle of least privilege to limit unauthorized access. Backup strategies should include offline, encrypted backups covering the entire data infrastructure, ensuring rapid recovery in the event of a ransomware attack. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
❌
❌