Security News > 2020 > February > Netherlands University Pays $240,000 After Targeted Ransomware Attack
UM has been open and forthcoming on the details of the attack, providing detailed insight into a classic targeted ransomware attack.
"The modus operandi of the group behind this specific attack," said Fox-IT in a forensic report commissioned by UM, "Comes over with a criminal group that already has a long history, and goes back to at least 2014. The group is often referred to publicly as 'TA505', as well as 'GraceRAT', named after one of the tools used by the group."
One of these had not been fully patched, and the group was able to gain full rights across the infrastructure.
The group surveilled the topology and was able to collect multiple account usernames and passwords.
There is little doubt that ransomware attacks against universities will continue, while cyber insurance already has a good track record in funding victims' ransom payments.
News URL
Related news
- Critical SonicWall SSLVPN bug exploited in ransomware attacks (source)
- NoName ransomware gang deploying RansomHub malware in recent attacks (source)
- Port of Seattle hit by Rhysida ransomware in August attack (source)
- AutoCanada says ransomware attack "may" impact employee data (source)
- Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks (source)
- Embargo ransomware escalates attacks to cloud environments (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Casio confirms customer data stolen in a ransomware attack (source)