Security News > 2021 > October > FIN12 hits healthcare with quick and focused ransomware attacks

FIN12 is a prolific threat actor with a strong focus on making money that executes ransomware attacks since at least October 2018.
FIN12 is characterized by skipping the data exfiltration step that most ransomware gangs have adopted to increase their chances of getting paid.
FIN12 are known for their preference for deploying Ryuk ransomware but the gang also used Conti, Ryuk's successor, in at least one attack investigated by Mandiant.
The researchers say that FIN12 also engaged in other ransomware incidents that involved data theft using Ryuk.
In a profile of the group published today by cybersecurity company Mandiant, researchers note that many FIN12 victims are in the healthcare sector.
Organizations in the healthcare sector have been a constant target for FIN12, even during the Covid-19 pandemic, as almost 20% of the FIN12 attacks that Mandiant observed were against entities in this industry.
News URL
Related news
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hunters International ransomware claims attack on Tata Technologies (source)
- Toronto Zoo shares update on last year's ransomware attack (source)
- Ransomware gang creates tool to automate VPN brute-force attacks (source)
- SANS Institute Warns of Novel Cloud-Native Ransomware Attacks (source)
- ⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More (source)
- BlackLock ransomware claims nearly 50 attacks in two months (source)
- TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure” (source)
- For healthcare orgs, DR means making sure docs can save lives during ransomware infections (source)
- Texas State Bar warns of data breach after INC ransomware claims attack (source)