SpearTip | June 10th, 2022

With summer approaching, ransomware groups are ramping up their attack methods and techniques. Researchers discovered that threat actors spent on average 92.5 hours encrypting systems. This installment of ‘Weekly Ransomware Wrap-up’ is a clear indication that threat actors never take a break.

Louisiana state officials are investigating a possible system breach from a AlphV ransomware attack affecting Alexandria and stole more 80 GB in compressed form of important city data.

DeadBolt ransomware is using multitiered extortion scheme to target internet-facing Network-Attached Storage (NAS) devices and internet-connected QNAP devices that uses QTS 4.3.6 and QTS 4.4.1.

The cybercrime group, Evil Corp, is switching to deploy LockBit ransomware on targets’ networks to avoid sanctions imposed by the United States Treasury Department’s Office of Foreign Assets Control (OFAC).

Cape Cod Regional Transit Authority (CCRTA) transportation systems suffer a ransomware attack. The administrators informed their staff that files on their servers had been encrypted.

Black Basta ransomware group partnering with the QBot, a Windows malware operation, to gain initial access to companies’ environments and to spread laterally throughout the networks.

These ransomware attacks shows that groups are evolving and improving their tactics and the importance of partnering with a cybersecurity company like SpearTip that can handle breaches with one of the fastest response times in the industry.

If your company is experiencing a breach, call our Security Operations Centers at 833.997.7327 to speak directly with an engineer.