The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector


The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

Pierluigi Paganini
The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector September 20, 2024

The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

Microsoft warns that a financially motivated threat actor is using INC ransomware in attacks aimed at the healthcare sector in the U.S.

Microsoft Threat Intelligence team revealed that a financially motivated threat actor, tracked as Vanilla Tempest (formerly DEV-0832) is using the INC ransomware for the first time to target the U.S. healthcare sector.

“Vanilla Tempest receives hand-offs from Gootloader infections by the threat actor Storm-0494, before deploying tools like the Supper backdoor, the legitimate AnyDesk remote monitoring and management (RMM) tool, and the MEGA data synchronization tool.” Microsoft wrote on X.

Vanilla Tempest has been active since July 2022, it was observed targeting organizations in the education, healthcare, IT, and manufacturing sectors. The group employed various ransomware payloads in its attacks, including BlackCat, Quantum Locker, Zeppelin, and Rhysida.

The threat actor uses Remote Desktop Protocol (RDP) for lateral movement and deploys the INC ransomware payload through the Windows Management Instrumentation Provider Host.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)







Source link