MSSP, Ransomware

Feds: 70+ Countries Impacted by Ghost Ransomware Attacks

Adobe Stock

Since early 2021, organizations in the critical infrastructure, government, healthcare, education, technology, and manufacturing sectors across more than 70 countries have been targeted by the Ghost ransomware operation in attacks exploiting vulnerable internet-exposed systems since early 2021, reports BleepingComputer.

Intrusions by Ghost — also known as Cring, Crypt3r, Hello, HsHarada, Phantom, Rapture, Strike, and Wickrme — involved the abuse of known Fortinet FortiOS, Microsoft Exchange, and Adobe ColdFusion flaws to facilitate the deployment of the Cring.exe, ElysiumO.exe, Ghost.exe, and Locker.exe ransomware strains, according to a joint advisory from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center.

The agencies have urged organizations to ensure regular and off-site backups, timely firmware, software, and operating system patching, prioritize remediation of Ghost-targeted vulnerabilities, implement network segmentation, and enable phishing-resistant multi-factor authentication to circumvent potential Ghost ransomware intrusions.

The federal alert comes four years after Amigo_A and Swisscom's CSIRT team reported the Ghost ransomware gang deployed Mimikatz samples before proceeding with Cobalt Strike and ransomware compromise.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.