FBI Cautions Organizations on Dual Ransomware Attacks

Alston & Bird
Contact

Alston & Bird

The Federal Bureau of Investigation (FBI) issued a Private Industry Notification on September 27, 2023, highlighting two concerning ransomware trends and providing companies with guidance on mitigating potential threat actor activity.

As of July 2023, the FBI observed multiple ransomware attacks where two attacks against the same victim involving different ransomware variants are deployed often within 48 hours of one another. Ransomware variants include different combinations of AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal. “Second ransomware attacks against an already compromised system could significantly harm victim entities,” said the FBI. These dual ransomware attacks have resulted in a combination of data encryption, exfiltration, and financial losses from ransom payments.

Another notable trend in ransomware attacks involves new data destruction tactics designed to pressure victims to negotiate. The FBI noted that multiple ransomware groups observed in early 2022 have begun adding new code to their custom data theft tools, wipers, and malware to avoid detection. In other instances, malware deployed on a compromised system contains wiper tools that remain dormant until a set time, when the threat actor executes the tool to corrupt data in alternating intervals.

Organizations are advised to strengthen their networks by maintaining offline data backups, closely monitoring external remote connections and remote desktop protocol (RDP) use, enforcing multifactor authentication (MFA) across all services, reviewing the security posture of third parties and vendors, and timely patching updates. The FBI further highlighted the importance of performing comprehensive scans of an organization’s environment to identify potential vulnerabilities and implementing network segmentation to restrict the spread of ransomware. Auditing user accounts and securing accounts with strong passwords that comply with National Institute of Standards and Technology (NIST) standards are also recommended.

Organizations are encouraged to report suspicious or criminal activities to their local FBI field offices or ic3.gov. Reports should include the date, time, location, type of activity, number of people affected, type of equipment used for the activity, the name of the organization, and a designated point of contact.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Alston & Bird | Attorney Advertising

Written by:

Alston & Bird
Contact
more
less

Alston & Bird on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide