INC Ransom attacks Tech-Quip
Date:
March 29, 2024
Overview
Title
INC Ransom attacks Tech-Quip
Victim
Tech-Quip
Attacker
INC Ransom
Location
Size of Attack
Unknown/TBD
First Reported
March 29, 2024
Last Updated
October 31, 2022
INC Ransom ransomware group has allegedly attacked Tech-Quip, although no further details have been disclosed. Established in 1973, Tech-Quip has grown to become one of the largest manufacturer’s representatives for instrumentation and analytical products in the Gulf Coast. Headquartered in Houston, with an office in Baton Rouge, its staff consists of fifteen professional outside salespeople as well as six experienced inside salesmen. INC Ransom was first observed in the summer of 2023, and it is unclear if they maintain a RaaS affiliate operation or are a closed group. INC uses common TTPs, such as leveraging compromised RDP (Remote Desktop Protocol) credentials to gain access and move laterally in a targeted environment. NC has been observed delivering ransomware using legitimate tools like WMIC and PSEXEC and using other Living-off-the-Land (LOTL) techniques, abusing applications INCluding MSPaint, WordPad, NotePad, MS Internet Explorer, MS Windows Explorer, and AnyDesk for lateral movement. INC has also been observed abusing tools like Esentutl for reconnaissance and MegaSync for data exfiltration. INC is written in C++ and uses AES-128 in CTR mode to encrypt files, and it also has a Linux version. It is unclear if INC employs any advanced security tool evasion techniques, and there are indications that they may attempt to delete Volume Shadow Copies (VSS) to hinder encryption rollback attempts. NC targets a wide array of industries, including manufacturing, retail, IT, hospitality, pharma, construction, and the public sector. INC practices double extortion and maintains a leak site for double extortion, threatening to expose the victim. INC has made good on threats to expose sensitive data if a target does not pay the ransom demand.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.