U.S. cybersecurity agencies have issued a serious warning regarding the RansomHub group, which has been linked to over 210 ransomware attacks since February. This advisory was published by the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS). The report details how RansomHub has aggressively targeted various sectors, including healthcare, financial services, water, transportation, and government entities. The group’s prominence surged after its involvement in a significant breach of UnitedHealth Group, which affected sensitive information for nearly a third of the American population, and it has since expanded its operations, claiming responsibility for several high-profile attacks.
The rise of RansomHub coincides with the recent decline of other major ransomware organizations, such as LockBit and AlphV, which have suffered takedowns and significant law enforcement actions. As a result, RansomHub has attracted numerous affiliates from these former groups, strengthening its position in the ransomware ecosystem. Unlike many of its predecessors, RansomHub employs a more sophisticated approach, executing complex attacks that involve encrypting systems and exfiltrating data before any ransom demand is made. Victims are typically contacted via a link to negotiate ransom payment, which must be completed within a specified time frame ranging from 3 to 90 days.
The advisory outlines that RansomHub has evolved from earlier operations like Cyclops and Knight, with evidence indicating that more skilled cybercriminals have now joined their ranks. While Knight was once considered a lower-tier ransomware operation, its modern iteration has shown improved capabilities. The advisory also highlighted the group’s exploitation of various vulnerabilities in widely used software from companies like Microsoft, Citrix, and Apache, indicating a sophisticated understanding of cybersecurity weaknesses. Affiliates are known to use remote access software, such as Anydesk, to facilitate their attacks.
To combat these growing threats, CISA has launched a new cyber incident reporting portal, encouraging organizations experiencing cyberattacks to report incidents to the government. Jeff Greene, CISA’s Executive Assistant Director for Cybersecurity, stressed the importance of reporting incidents for both individual and communal benefit. Sharing information about attacks can empower the agency to provide effective responses and prevent further victimization, thus enhancing the overall resilience of the cybersecurity landscape. By working together, organizations can significantly mitigate the risks associated with ransomware and other cyber threats.
Reference: