• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
microsoft blames russian hackers for prestige ransomware attacks on ukraine

Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland

You are here: Home / General Cyber Security News / Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland
November 11, 2022

Microsoft on Thursday attributed the current spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a threat cluster that shares overlaps with the Russian state-sponsored Sandworm team.

The attacks, which have been disclosed by the tech huge previous month, included a pressure of formerly undocumented malware known as Status and is reported to have taken spot within an hour of every single other throughout all victims.

The Microsoft Threat Intelligence Center (MSTIC) is now tracking the threat actor underneath its ingredient-themed moniker Iridium (née DEV-0960), citing overlaps with Sandworm (aka Iron Viking, TeleBots, and Voodoo Bear).

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“This attribution evaluation is based mostly on forensic artifacts, as well as overlaps in victimology, tradecraft, abilities, and infrastructure, with recognised Iridium exercise,” MSTIC said in an update.

The organization also even more assessed the group to have orchestrated compromise action targeting quite a few of the Prestige victims as considerably back as March 2022, right before culminating in the deployment of the ransomware on October 11.

The process of first compromise nonetheless continues to be unknown, while it is really suspected that it concerned gaining obtain to highly privileged qualifications required to activate the killchain.

“The Status campaign might spotlight a calculated shift in Iridium’s harmful attack calculus, signaling enhanced risk to organizations directly giving or transporting humanitarian or army support to Ukraine,” the enterprise explained.

The conclusions appear in excess of a month immediately after Recorded Upcoming joined another action team (UAC-0113) with ties to the Sandworm actor as obtaining singled out Ukrainian people by masquerading as telecom companies in the region to supply backdoors onto compromised equipment.

Microsoft, in its Electronic Protection Report revealed very last 7 days, further more identified as out Iridium for its pattern of focusing on critical infrastructure and operational technology entities.

Prestige Ransomware Attacks

“Iridium deployed the Industroyer2 malware in a failed effort to go away tens of millions of persons in Ukraine without the need of electricity,” Redmond mentioned, introducing the threat actor employed “phishing strategies to gain preliminary entry to desired accounts and networks in companies in and outside Ukraine.”

The growth also comes amid sustained ransomware attacks aimed at industrial businesses around the world through the third quarter of 2022, with Dragos reporting 128 these incidents all through the time period in contrast to 125 in the earlier quarter.

CyberSecurity

“The LockBit ransomware household account for 33% and 35% respectively of the full ransomware incidents that concentrate on industrial businesses and infrastructures in the very last two quarters, as the teams extra new abilities in their new LockBit 3. strain,” the industrial security company explained.

Other distinguished strains observed in Q3 2022 include things like Cl0p, MedusaLocker, Sparta, BianLian, Donuts, Onyx, REvil, and Yanluowang.

Discovered this post exciting? Comply with THN on Facebook, Twitter  and LinkedIn to study additional exceptional articles we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «the long road ahead to ransomware preparedness The long road ahead to ransomware preparedness
Next Post: Russian-Canadian National Charged Over Involvement in LockBit Ransomware Attacks russian canadian national charged over involvement in lockbit ransomware attacks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.