{"id":304,"date":"2024-09-19T11:42:59","date_gmt":"2024-09-19T11:42:59","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=304"},"modified":"2024-09-19T11:42:59","modified_gmt":"2024-09-19T11:42:59","slug":"microsoft-warns-of-ransomware-attacks-on-us-healthcare","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=304","title":{"rendered":"Microsoft warns of ransomware attacks on US healthcare"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Ransomware group Vanilla Tempest is targeting US healthcare providers using the INC ransomware service, according to Microsoft.<\/p>\n<p>\u201cMicrosoft observed the financially motivated threat actor tracked as Vanilla Tempest using INC ransomware for the first time to target the healthcare sector in the United States,\u201d Microsoft said in an X post.<\/p>\n<p>The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.<\/p>\n<h2 class=\"wp-block-heading\">Initial Access through Gootloader infection<\/h2>\n<p>The threat actor used a compromised access into the victims\u2019 systems, which was reportedly borrowed from a Gootloader infection, to establish and maintain remote access to their network and deploy INC <a href=\"https:\/\/www.csoonline.com\/article\/563507\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">ransomware<\/a>.<\/p>\n<p>\u201cVanilla Tempest receives hand-offs from Gootloader infections by the threat actor Storm-0494, before deploying tools like the Supper backdoor, the legitimate AnyDesk remote monitoring and management (RMM) tool, and the MEGA data synchronization tool,\u201d Microsoft said. \u201cThe threat actor then performs lateral movement through Remote Desktop Protocol (RDP) and uses the Windows Management Instrumentation Provider Host to deploy the INC ransomware payload.\u201d<\/p>\n<p>Microsoft refrained from naming the healthcare provider(s) targeted in this attack. It is also unclear if the threat actor has made any ransom demands to date and received or were denied any payment. Queries sent to Microsoft were not responded to until the publishing of this article.<\/p>\n<p>However, it is quite possible, from the use of the data synchronization tool MEGASync, that the threat actor went straight after extortion without making any encryption at all. The tool is used by the affiliates for data exfiltration and is part of the INC ransomware kit. \u201cIn several cases, Microsoft assesses that the group did not deploy ransomware and instead possibly performed extortion using only exfiltrated stolen data,\u201d Microsoft has said in an Oct 2022<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/25\/dev-0832-vice-society-opportunistic-ransomware-campaigns-impacting-us-education-sector\/\" target=\"_blank\" rel=\"noopener\"> blog<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">A frequent public sector offender<\/h2>\n<p>Vanilla Tempest, also tracked as DEV-0832 and Vice Society, is a known offender of the education and healthcare sector. Additionally, the threat actor was often observed targeting the manufacturing industry.<\/p>\n<p>Active since June 2021, the group has used multiple ransomware families, including BlackCat, Quantum Locker, Zeppelin, and Rhysida, and typically uses PowerShell scripts in their attacks.<\/p>\n<p>Microsoft noted Vanilla Tempest shifting to INC ransomware for healthcare targeting. This could be attributed to the fact that INC ransomware-as-a-service (RaaS) is stacked with double\/triple extortion tooling, and Vanilla Tempest is simply seeking a quicker and guaranteed payday. <\/p>\n<p>There are noticeable<a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/actor\/vanilla_tempest\" target=\"_blank\" rel=\"noopener\"> similarities<\/a> between Vice Society and the Rhysida ransomware group, indicating a possible connection or even a rebranding effort. Earlier this week, the Port of Seattle <a href=\"https:\/\/www.csoonline.com\/article\/3523601\/port-of-seattle-says-august-cyberattack-was-rhysida-ransomware.html\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> Rhysida ransomware was behind an August 2024 cyberattack on their systems.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Ransomware group Vanilla Tempest is targeting US healthcare providers using the INC ransomware service, according to Microsoft. \u201cMicrosoft observed the financially motivated threat actor tracked as Vanilla Tempest using INC ransomware for the first time to target the healthcare sector in the United States,\u201d Microsoft said in an X post. The threat actor borrowed initial [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=304"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/304\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/305"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}