Press ESC to close

Phobos Ransomware Indictment Sheds Light on Long-Running, quietly Successful Scheme

Category Details
Threat Actors Phobos Ransomware group; key figure: Russian National Evgenii Ptitsyn.
Campaign Overview Conducted ransomware attacks over five years, targeting U.S. federal contractors, healthcare, education, and law enforcement. Generated $16M globally.
Target Regions Primarily U.S., including federal contractors, healthcare providers, public school systems, and a law enforcement union.
Methodology Ransomware-as-a-service (RaaS); affiliates purchased decryption keys for $300; targeted smaller organizations with low ransom demands.
Product Targeted Computer systems of healthcare providers, schools, law enforcement unions, and federal contractors.
Malware Reference Phobos ransomware; associated variants include Elbie and Eking.
Tools Used Phobos ransomware distributed via dark web RaaS platform.
Vulnerabilities Exploited Lack of robust cybersecurity measures in targeted organizations; exploited remote access vulnerabilities.
TTPs – Initial Access (T1190): Exploited weak access points.
– Impact (T1486): File encryption for ransom.
– RaaS monetization model.
Attribution Evgenii Ptitsyn identified as a Phobos administrator; linked to over 1,000 ransomware infections globally.
Recommendations Strengthen cybersecurity defenses, maintain offline backups, use multi-factor authentication, and adhere to FBI guidance against paying ransoms.
Source The Record

Read full article: https://therecord.media/phobos-ransomware-indictment-five-years-under-the-radar

Disclaimer: The above summary has been generated by an AI language model.

Source: The Record

Published on: November 20, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *