Microsoft Alerts U.S. Healthcare Sector About New INC Ransomware Threat

September 19, 2024
Healthcare / Malware

Microsoft has reported that a financially motivated threat actor is utilizing a ransomware strain known as INC for the first time to specifically target the U.S. healthcare sector. The company’s threat intelligence team, tracking this activity under the name Vanilla Tempest (formerly DEV-0832), noted, “Vanilla Tempest is connected to GootLoader infections orchestrated by the threat actor Storm-0494, and employs tools such as the Supper backdoor, the legitimate AnyDesk remote monitoring and management (RMM) software, and MEGA for data synchronization.” Following this, attackers execute lateral movements using Remote Desktop Protocol (RDP) and deploy the INC ransomware payload via Windows Management Instrumentation (WMI) Provider Host. Microsoft revealed that Vanilla Tempest has been operational since at least July 2022, with previous targets including the education, healthcare, IT, and manufacturing sectors.

Microsoft Alerts Healthcare Sector to Emerging INC Ransomware Threat

On September 19, 2024, Microsoft issued a warning regarding a new ransomware variant named INC, which has been identified as a potential threat to the U.S. healthcare sector. This alarming development comes in the wake of the company’s threat intelligence team, known as Vanilla Tempest—previously recognized as DEV-0832—tracking this financially motivated attack group.

Reports indicate that Vanilla Tempest operates by exploiting a pipeline involving GootLoader infections, orchestrated by the threat actor identified as Storm-0494. Following this initial compromise, attackers utilize a combination of tools, including the Supper backdoor, the legitimate remote monitoring and management (RMM) tool AnyDesk, and the MEGA data synchronization service. Such methods illustrate a comprehensive approach to infiltrating systems within the healthcare industry.

Once access is established, malicious actors conduct lateral movement within the network using Remote Desktop Protocol (RDP). They then leverage the Windows Management Instrumentation (WMI) Provider Host to deliver the INC ransomware payload, effectively locking down critical data and demanding ransoms. Microsoft’s threat intelligence has tracked Vanilla Tempest’s activities at least since July 2022, noting that their operations have previously targeted education, IT, and manufacturing sectors alongside healthcare.

The targeting of the U.S. healthcare sector carries significant implications. As ransomware has increasingly become a favored weapon among cybercriminals, the repercussions can extend far beyond financial loss, potentially disrupting patient care and endangering sensitive health data. The complexity of these attacks underscores the urgent need for robust cybersecurity measures within healthcare organizations.

From a technical standpoint, the tactics and techniques utilized in these attacks can be aligned with the MITRE ATT&CK framework. Likely methodologies include initial access via GootLoader infections, persistence through the deployment of the Supper backdoor, and privilege escalation tactics leveraged through RDP access. These strategies illustrate a calculated approach to infiltrating network defenses, focusing on maintaining a foothold within targeted environments.

Cybersecurity experts emphasize the necessity for heightened vigilance and preparedness, particularly for organizations within the healthcare sector. As cyber threats evolve and become more sophisticated, proactive measures, including continuous monitoring and employee training, are essential components of an effective defense strategy.

This warning serves as a critical reminder of the persistent and evolving nature of cyber threats, reinforcing the need for business owners to remain informed and equipped to counteract potential risks to their organizations.

Source link