HomeCII/OTRansomware Encryptor in Inc Contains Keys for Data Recovery of Victims

Ransomware Encryptor in Inc Contains Keys for Data Recovery of Victims

Published on

spot_img

The recent cyberattack on McLaren Health Care, carried out by the Inc ransomware group, has highlighted the increasing targeting of critical healthcare facilities by ransomware groups. The attack, which disrupted McLaren’s IT and phone systems, forced hospitals and outpatient clinics to implement downtime procedures, resulting in the rescheduling of nonemergency appointments and tests.

While McLaren initially did not confirm if patient or employee information was compromised, a leaked ransom note revealed that the Inc ransomware group was holding their data hostage. This incident underscores the growing threat posed by ransomware attacks on healthcare organizations.

In a surprising turn of events, victims of Inc ransomware attacks now have a new lifeline in the form of valuable information leaked from the encryptor used by the group. GuidePoint Security recently published a report detailing how this leaked data can aid in the decryption process, potentially leading to successful data recovery.

According to the report, newly encrypted files by Inc feature an 80-byte footer that discloses crucial information about the encryption process, such as the speed and extent of encryption. By analyzing this data, victims can make informed decisions on how to tackle the threat and potentially recover their files without relying on the decryptor provided by the attackers.

For instance, the footer indicates whether a file was encrypted quickly, which only affects certain parts of the file, or slowly, which encrypts the entire contents. This information can guide victims in determining the best approach for decryption, maximizing their chances of recovering their data.

Moreover, the absence of the 80-byte footer and the presence of a .inc tag on a file signal that it has been corrupted beyond recovery, even with the decryptor. This underscores the importance of analyzing the leaked data to assess the feasibility of file recovery post-attack.

Jason Baker, a threat intelligence consultant at GuidePoint Security, advises victims to carefully examine the footer values before running the decryptor to gauge the potential success of data recovery. By leveraging this leaked information, victims can improve their chances of recovering encrypted files and mitigating the impact of the ransomware attack.

In addition to the technical aspects of the attack, there has been a noticeable shift in the ethical considerations of ransomware groups, particularly in their targeting of healthcare organizations. Previously, certain groups refrained from attacking healthcare facilities, but that norm has eroded over time.

The Inc ransomware group, known for targeting industries like healthcare, education, and nonprofits, exemplifies this shift in tactics. Recent disruptions in the ransomware landscape have prompted some groups to target previously off-limits sectors, driven by the perceived profitability of such attacks.

Overall, the McLaren Health Care cyberattack sheds light on the evolving tactics of ransomware groups and the crucial role of leaked information in aiding victims in their recovery efforts. As healthcare organizations continue to be prime targets for cybercriminals, it is imperative for entities to enhance their cybersecurity measures to defend against such malicious threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...