HHS Alerts on Cl0p Ransomware Following GoAnywhere MFT Exploits

Date:

February 23, 2023

World map

Overview

Title

HHS Alerts on Cl0p Ransomware Following GoAnywhere MFT Exploits

Victim

Department of Health and Human Services

Attacker

clop

Location

Washington, D.C., USA

Washington, D.C.,

Size of Attack

Unknown/TBD

First Reported

February 23, 2023

Last Updated

October 31, 2022

The Department of Health and Human Services has issued an alert warning that organizations in the healthcare sector need to pay particular attention to attacks by the ransomware gang known as Cl0p.  

The threat actors behind Cl0p have been particularly focused on the healthcare sector, hence the latest guidance issued by the HHS’s HC3 (Health Sector Cybersecurity Coordination Center) following the recent exploitation of a GoAnywhere MFT vulnerability.

Takeaway: Cl0p displays advanced anti-analysis capabilities and anti-virtual machine analysis to prevent further investigations in an emulated environment – such as sandboxing – and it is interesting to note that the threat actors recently developed a Linux version of the ransomware. While Linux has a small footprint in desktop computing, it runs ~80% of all web servers, the majority of smartphones, all supercomputers, and a good portion of all embedded devices – including those being widely used in healthcare settings.  

While there are comparatively few Linux targets, the targets are potentially extremely lucrative. The "always on" nature of Linux systems provides a strategic beachhead for moving laterally throughout the network. Targeting Linux systems would allow the threat actors to disrupt the most critical parts of a network to demand high ransom amounts, and this is especially true in the healthcare sector.

Ransomware attacks are the biggest threat facing organizations today, and healthcare providers have been hit particularly hard. Attackers have significantly advanced their ability to quietly infiltrate large portions of a target's network in order to demand a higher ransom payout and exfiltrate sensitive data to be used as additional leverage to get the victims to pay. This is a big-money game, and we continue to see healthcare and other critical infrastructure providers be a favorite target given they typically have the least amount of resources to dedicate to securing these sensitive systems.

Organizations of every size need to implement a strong prevention and resilience strategy to defend against ransomware attacks, including:

  • Keeping all software and operating systems up to date and patched
  • Assuring critical data is backed up offsite and protected from corruption in the case of a ransomware attack
  • Assure all endpoints are protected with an EPP solution like next-generation anti-virus (NGAV) software and an anti-ransomware solution
  • Implement network segmentation and Zero Trust policies
  • Implement an employee awareness program to educate against risky behaviors, phishing techniques, etc.
  • Plan and prepare for failure by running regular tabletop exercises and ensuring all stakeholders are ready and available to respond to an attack at all times

Halcyon.ai is the industry’s first dedicated, adaptive security platform that combines multiple advanced proprietary prevention engines along with AI models focused specifically on stopping ransomware – talk to a Halcyon expert today to find out more.

Updates: (descending from most recent)

The threat actors behind Cl0p have been particularly focused on the healthcare sector, hence the latest guidance issued by the HHS’s HC3...

Oh no!

This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.

Attack reported by

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.

lockbit attacks SpaceX
Date
March 15, 2023
Ransomware group
lockbit
Location

Hawthorne, USA

California, USA

Industry
Manufacturing
Victim
SpaceX
lockbit attacks SpaceX
Date
March 15, 2023
Ransomware group
lockbit
Location

Hawthorne, USA

California, USA

Industry
Manufacturing
Victim
SpaceX
alphv attacks Ring
Date
March 14, 2023
Ransomware group
alphv
Location

Santa Monica, USA

CA, USA

Industry
Information & Technology
Victim
Ring
alphv attacks Ring
Date
March 14, 2023
Ransomware group
alphv
Location

Santa Monica, USA

CA, USA

Industry
Information & Technology
Victim
Ring
medusa attacks Minneapolis Public Schools
Date
March 9, 2023
Ransomware group
medusa
Location

Minneapolis, USA

Minnesota, USA

Industry
Education
Victim
Minneapolis Public Schools
medusa attacks Minneapolis Public Schools
Date
March 9, 2023
Ransomware group
medusa
Location

Minneapolis, USA

Minnesota, USA

Industry
Education
Victim
Minneapolis Public Schools
IceFire Ransomware Targeting Linux Distributions
Date
March 9, 2023
Ransomware group
icefire
Location

, USA

, USA

Industry
Information & Technology
Victim
Linux Systems
IceFire Ransomware Targeting Linux Distributions
Date
March 9, 2023
Ransomware group
icefire
Location

, USA

, USA

Industry
Information & Technology
Victim
Linux Systems
lockbit3 attacks Indigo.ca
Date
February 28, 2023
Ransomware group
lockbit3
Location

Toronto, Canada

, Canada

Industry
Arts, Entertainment & Recreation
Victim
Indigo.ca
lockbit3 attacks Indigo.ca
Date
February 28, 2023
Ransomware group
lockbit3
Location

Toronto, Canada

, Canada

Industry
Arts, Entertainment & Recreation
Victim
Indigo.ca
Ransomware Attack on California Healthcare Provider Impacts 3.3 Million
Date
February 23, 2023
Ransomware group
Unknown
Location

Temecula, USA

California, USA

Industry
Healthcare
Victim
Regal Medical Group
Ransomware Attack on California Healthcare Provider Impacts 3.3 Million
Date
February 23, 2023
Ransomware group
Unknown
Location

Temecula, USA

California, USA

Industry
Healthcare
Victim
Regal Medical Group
HHS Alerts on Cl0p Ransomware Following GoAnywhere MFT Exploits
Date
February 23, 2023
Ransomware group
clop
Location

Washington, D.C., USA

, USA

Industry
Healthcare
Victim
Department of Health and Human Services
HHS Alerts on Cl0p Ransomware Following GoAnywhere MFT Exploits
Date
February 23, 2023
Ransomware group
clop
Location

Washington, D.C., USA

, USA

Industry
Healthcare
Victim
Department of Health and Human Services
BlackCat/ALPHV Ransomware Gang Hits City of Lakewood
Date
February 22, 2023
Ransomware group
alphv
Location

Lakewood, USA

California, USA

Industry
Victim
City of Lakewood
BlackCat/ALPHV Ransomware Gang Hits City of Lakewood
Date
February 22, 2023
Ransomware group
alphv
Location

Lakewood, USA

California, USA

Industry
Victim
City of Lakewood
royal attacks Unisco
Date
February 20, 2023
Ransomware group
royal
Location

Buena Park, USA

California, USA

Industry
Transportation & Warehousing
Victim
Unisco
royal attacks Unisco
Date
February 20, 2023
Ransomware group
royal
Location

Buena Park, USA

California, USA

Industry
Transportation & Warehousing
Victim
Unisco
Production at Agriculture Giant Dole Disrupted by Ransomware Attack
Date
February 17, 2023
Ransomware group
Unknown
Location

Charlotte, USA

North Carolina, USA

Industry
Agriculture
Victim
Dole
Production at Agriculture Giant Dole Disrupted by Ransomware Attack
Date
February 17, 2023
Ransomware group
Unknown
Location

Charlotte, USA

North Carolina, USA

Industry
Agriculture
Victim
Dole