Security News > 2022 > March > FBI: Avoslocker ransomware targets US critical infrastructure
The Federal Bureau of Investigation warns of AvosLocker ransomware being used in attacks targeting multiple US critical infrastructure sectors.
"AvosLocker is a Ransomware as a Service affiliate-based group that has targeted victims across multiple critical infrastructure sectors in the United States including, but not limited to, the Financial Services, Critical Manufacturing, and Government Facilities sectors," the FBI said [PDF].
"As a result, AvosLocker indicators of compromise vary between indicators specific to AvosLocker malware and indicators specific to the individual affiliate responsible for the intrusion."
The advisory provides network defenders with indicators of compromise they can use to detect and block AvosLocker ransomware attacks.
You can find more info on AvosLocker ransomware and what you need to do if you get hit by this ransomware in our forum.
Mitigation measures to help network defenders prevent AvosLocker ransomware attacks include network segmentation and regular offline backups, as well as keeping software up to date, especially Microsoft Exchange Server, a known attack vector used by AvosLocker affiliates.
News URL
Related news
- Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Ransomware fiends boast they've stolen 1.4TB from US pharmacy network (source)
- US charges Phobos ransomware admin after South Korea extradition (source)
- Phobos ransomware administrator faces US cybercrime charges (source)
- Russian suspected Phobos ransomware admin extradited to US over $16M extortion (source)
- Mega US healthcare payments network restores system 9 months after ransomware attack (source)
- Ransomware payments are now a critical business decision (source)
- US government, energy sector contractor hit by ransomware (source)
- Vodka maker Stoli files for bankruptcy in US after ransomware attack (source)