Security News > 2020 > February > Netherlands University Pays $240,000 After Targeted Ransomware Attack
UM has been open and forthcoming on the details of the attack, providing detailed insight into a classic targeted ransomware attack.
"The modus operandi of the group behind this specific attack," said Fox-IT in a forensic report commissioned by UM, "Comes over with a criminal group that already has a long history, and goes back to at least 2014. The group is often referred to publicly as 'TA505', as well as 'GraceRAT', named after one of the tools used by the group."
One of these had not been fully patched, and the group was able to gain full rights across the infrastructure.
The group surveilled the topology and was able to collect multiple account usernames and passwords.
There is little doubt that ransomware attacks against universities will continue, while cyber insurance already has a good track record in funding victims' ransom payments.
News URL
Related news
- Embargo ransomware escalates attacks to cloud environments (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Casio confirms customer data stolen in a ransomware attack (source)
- Schools bombarded by nation-state attacks, ransomware gangs, and everyone in between (source)
- BianLian ransomware claims attack on Boston Children's Health Physicians (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)
- Tech giant Nidec confirms data breach following ransomware attack (source)
- Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (source)