Press ESC to close

Inc. Ransom

CategoryDetails
Threat ActorsInc. ransomware
Campaign OverviewMulti-extortion ransomware operation emerged in July 2023; steals and threatens to leak victim data unless ransom is paid.
Target RegionsGlobal, including healthcare, education, government, and technology industries.
MethodologyInitial access via spear-phishing or exploiting CVE-2023-3519 in Citrix NetScaler; uses COTS and LOLBINs for lateral movement.
Product TargetedHealthcare, education, government, technology sectors. Victims include organizations across these industries.
Malware ReferenceInc. ransomware (uses specific command-line arguments for encryption and target selection).
Tools UsedNETSCAN.EXE, MEGAsyncSetup64.EXE, ESENTUTL.EXE, AnyDesk.exe.
Vulnerabilities ExploitedCVE-2023-3519 in Citrix NetScaler for initial access.
TTPsData encryption, file/folder encryption commands, deletion of shadow copies, ransom note generation in .TXT and .HTML.
AttributionNo direct attribution mentioned.
RecommendationsUse anti-malware tools, monitor network traffic, conduct security audits, train employees, implement backup & recovery plans.
SourceSentinelOne

Read full article: Inc. Ransom – SentinelOne
Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *