Microsoft Alerts About Fresh INC Ransomware Targeting U.S. Healthcare Industry

Sep 19, 2024Ravie LakshmananHealthcare / Malware

Microsoft has disclosed that a financially driven threat actor has been identified deploying a ransomware variant known as INC to specifically target the healthcare industry in the United States.

Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector

Sep 19, 2024Ravie LakshmananHealthcare / Malware

Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector

Microsoft has disclosed that a financially driven threat actor has been identified deploying a ransomware variant known as INC to specifically target the healthcare industry in the United States.

The large technology company’s threat intelligence team is monitoring the operations under the moniker Vanilla Tempest (formerly known as DEV-0832).

“Vanilla Tempest is handed over GootLoader infections by a threat actor named Storm-0494, subsequently utilizing tools such as the Supper backdoor, the legitimate AnyDesk remote monitoring and management (RMM) tool, and the MEGA data synchronization tool,” as per statements released on X.

In a subsequent phase, the attackers advance with lateral movement through Remote Desktop Protocol (RDP) before leveraging the Windows Management Instrumentation (WMI) Provider Host to distribute the INC ransomware payload.

The producer of Windows stated that Vanilla Tempest has been operational since at least July 2022, with previous assaults focusing on education, healthcare, IT, and manufacturing domains utilizing various ransomware strains like BlackCat, Quantum Locker, Zeppelin, and Rhysida.

Cybersecurity

It should be noted that this threat actor is also identified as Vice Society and is recognized for utilizing existing lockers to execute attacks, rather than developing a custom variant.

This occurrence coincides with the observation of ransomware groups such as BianLian and Rhysida increasingly resorting to Azure Storage Explorer and AzCopy for data exfiltration from infiltrated networks in an effort to avoid detection.

“This application, typically employed for managing Azure storage and its contents, is being repurposed by threat actors for comprehensive data transfers to cloud storage,” as stated by researcher Britton Manahan from modePUSH mentioned.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.