SpearTip | July 1st, 2022

As has always been the case, there is much to report in our latest “Weekly Ransomware Wrap-Up”.

LockBit ransomware group launches ‘LockBit 3.0’, a bounty program rewarding affiliates and researchers for reporting software bugs to the group. The ransomware group will then exploit these reported vulnerabilities: LockBit has been one of the more prolific threat operators in 2022.

Ransomware variant AstraLocker launches so-called ‘smash-and-grab’ attacks directly against users through malicious Microsoft Word attachments. The group does not seem to perform reconnaissance of targets, instead choosing to maximize victim count to maximize ransom payment opportunities.

Despite it being summer break, ransomware operations are continuing to disrupt colleges around the world. The Medical University of Innsbruck (Austria) and Napa Valley College (California) both suffered outages and operational disruptions following two separate ransomware attacks.

RansomHouse extortion group, which recently published a public-facing ‘victim’ list, claims responsibility for a ransomware attack against semiconductor developer, AMD. The investigation is ongoing.

IT systems were forced offline and day-to-day business operations have stalled at global publishing giant, Macmillan Publishers, following a reported ransomware attack.

As we move into the Independence Day weekend, it is vital for businesses to maintain vigilance on the threat landscape. Threat operators target weekends and holidays to launch their attacks as security teams tend to be short-staffed. Our team never takes a day off. SpearTip defends our partners 24x7x365 with active monitoring from our Security Operations Center.

If your company is experiencing a breach, call our Security Operations Centers at 833.997.7327 to speak directly with an engineer.