Security News > 2021 > October > FIN12 hits healthcare with quick and focused ransomware attacks
FIN12 is a prolific threat actor with a strong focus on making money that executes ransomware attacks since at least October 2018.
FIN12 is characterized by skipping the data exfiltration step that most ransomware gangs have adopted to increase their chances of getting paid.
FIN12 are known for their preference for deploying Ryuk ransomware but the gang also used Conti, Ryuk's successor, in at least one attack investigated by Mandiant.
The researchers say that FIN12 also engaged in other ransomware incidents that involved data theft using Ryuk.
In a profile of the group published today by cybersecurity company Mandiant, researchers note that many FIN12 victims are in the healthcare sector.
Organizations in the healthcare sector have been a constant target for FIN12, even during the Covid-19 pandemic, as almost 20% of the FIN12 attacks that Mandiant observed were against entities in this industry.
News URL
Related news
- Mega US healthcare payments network restores system 9 months after ransomware attack (source)
- Massive PSAUX ransomware attack targets 22,000 CyberPanel instances (source)
- North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- City of Columbus: Data of 500,000 stolen in July ransomware attack (source)
- Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Halliburton reports $35 million loss after ransomware attack (source)
- New Ymir ransomware partners with RustyStealer in attacks (source)
- New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks (source)