Security News > 2020 > February > Netherlands University Pays $240,000 After Targeted Ransomware Attack
UM has been open and forthcoming on the details of the attack, providing detailed insight into a classic targeted ransomware attack.
"The modus operandi of the group behind this specific attack," said Fox-IT in a forensic report commissioned by UM, "Comes over with a criminal group that already has a long history, and goes back to at least 2014. The group is often referred to publicly as 'TA505', as well as 'GraceRAT', named after one of the tools used by the group."
One of these had not been fully patched, and the group was able to gain full rights across the infrastructure.
The group surveilled the topology and was able to collect multiple account usernames and passwords.
There is little doubt that ransomware attacks against universities will continue, while cyber insurance already has a good track record in funding victims' ransom payments.
News URL
Related news
- BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks (source)
- JetBrains is still mad at Rapid7 for the ransomware attacks on its customers (source)
- Stanford: Data of 27,000 people stolen in September ransomware attack (source)
- Nissan confirms ransomware attack exposed data of 100,000 people (source)
- TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks (source)
- What the Latest Ransomware Attacks Teach About Defending Networks (source)
- Lessons from a Ransomware Attack against the British Library (source)
- Jackson County in state of emergency after ransomware attack (source)
- Panera Bread week-long IT outage caused by ransomware attack (source)
- The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack (source)