{"id":22417,"date":"2024-02-20T08:13:27","date_gmt":"2024-02-20T13:13:27","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=22417"},"modified":"2024-02-21T11:18:06","modified_gmt":"2024-02-21T07:18:06","slug":"ransowmare-attacks-in-2023","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ransowmare-attacks-in-2023\/22417\/","title":{"rendered":"Ransomware: the most high-profile attacks of 2023"},"content":{"rendered":"<p>Time was when any ransomware incident would spark a lively press and public reaction. Fast forward to the present, and the word \u201cransomware\u201d in a headline doesn\u2019t generate nearly as much interest: such attacks have become commonplace. Nonetheless, they continue to pose a grave threat to corporate security. This review spotlights the biggest and most high-profile incidents that occurred in 2023.<\/p>\n<h2>January 2023: LockBit attack on the UK\u2019s Royal Mail<\/h2>\n<p>\nThe year kicked off with the <a href=\"https:\/\/therecord.media\/lockbit-ransomware-group-threatens-royal-mail-data-leak-deadline\" target=\"_blank\" rel=\"nofollow noopener\">LockBit group attacking Royal Mail<\/a>, the UK\u2019s national postal service. The attack paralyzed international mail delivery, leaving millions of letters and parcels stuck in the company\u2019s system. On top of that, the parcel tracking website, online payment system, and several other services were also crippled; and at the Royal Mail distribution center in Northern Ireland, printers began spewing out copies of the LockBit group\u2019s distinctive orange ransom note.<\/p>\n<div id=\"attachment_50638\" style=\"width: 855px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171650\/ransowmare-attacks-in-2023-01.jpeg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50638\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171650\/ransowmare-attacks-in-2023-01.jpeg\" alt=\"LockBit demands a ransom from Royal Mail\" width=\"845\" height=\"1060\" class=\"size-full wp-image-50638\"><\/a><p id=\"caption-attachment-50638\" class=\"wp-caption-text\">The LockBit ransom note that printers at the Royal Mail distribution center began printing in earnest. <a href=\"https:\/\/twitter.com\/UK_Daniel_Card\/status\/1613583665740615682\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>As is commonly the case with modern ransomware attacks, LockBit threatened to post stolen data online unless the ransom was paid. Royal Mail refused to pay up, so the data ended up being published.<\/p>\n<h2>February 2023: ESXiArgs attacks VMware ESXi servers worldwide<\/h2>\n<p>\nFebruary <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide\/\" target=\"_blank\" rel=\"nofollow noopener\">saw<\/a> a massive automated ESXiArgs ransomware attack on organizations through the RCE vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21974\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2021-21974<\/a> in VMware ESXi servers. Although VMware released a patch for this vulnerability back in early 2021, the attack left more than 3000 VMware ESXi servers encrypted.<\/p>\n<p>The attack operators demanded just over 2BTC (around $45,000 at the time of the attack). For each individual victim they generated a new Bitcoin wallet and put its address in the ransom note.<\/p>\n<div id=\"attachment_50639\" style=\"width: 1212px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171701\/ransowmare-attacks-in-2023-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50639\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171701\/ransowmare-attacks-in-2023-02.jpg\" alt=\"ESXiArgs ransom note\" width=\"1202\" height=\"823\" class=\"size-full wp-image-50639\"><\/a><p id=\"caption-attachment-50639\" class=\"wp-caption-text\">Ransom demand from the original version of ESXiArgs ransomware. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Just days after the attack began, the cybercriminals <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-esxiargs-ransomware-version-prevents-vmware-esxi-recovery\/\" target=\"_blank\" rel=\"nofollow noopener\">unleashed a new strain<\/a> of the cryptomalware, making it far harder to recover encrypted virtual machines. To make their activities more difficult to trace, they also stopped giving out ransom wallet addresses, prompting victims to make contact through the P2P messenger <a href=\"https:\/\/en.wikipedia.org\/wiki\/Tox_(protocol)\" target=\"_blank\" rel=\"nofollow noopener\">Tox<\/a> instead.<\/p>\n<h2>March 2023: Clop group widely exploits a zero-day in GoAnywhere MFT<\/h2>\n<p>\nIn March 2023, the Clop group began <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day\/\" target=\"_blank\" rel=\"nofollow noopener\">widely exploiting a zero-day vulnerability<\/a> in Fortra\u2019s GoAnywhere MFT (managed file transfer) tool. Clop is well-known for its penchant for exploiting vulnerabilities in such services: in 2020\u20132021, the group <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-zealand-reserve-bank-breached-using-bug-patched-on-xmas-eve\/\" target=\"_blank\" rel=\"nofollow noopener\">attacked<\/a> organizations through a hole in Accelon FTA, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-gang-exploiting-solarwinds-serv-u-flaw-in-ransomware-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\">switching<\/a> in late 2021 to exploiting a vulnerability in SolarWinds Serv-U.<\/p>\n<p>In total, more than 100 organizations suffered attacks on vulnerable GoAnywhere MFT servers, including <a href=\"https:\/\/www.secureblink.com\/cyber-security-news\/p-and-g-hacked-by-clop-ransomware-using-zero-day-in-go-anywhere\" target=\"_blank\" rel=\"nofollow noopener\">Procter &amp; Gamble<\/a>, the <a href=\"https:\/\/thecyberexpress.com\/the-city-of-toronto-cyberattack-goanywhere\/\" target=\"_blank\" rel=\"nofollow noopener\">City of Toronto<\/a>, and <a href=\"https:\/\/healthitsecurity.com\/news\/community-health-systems-impacted-by-data-breach-tied-to-goanywhere-mft-vulnerability\" target=\"_blank\" rel=\"nofollow noopener\">Community Health Systems<\/a> \u2014 one of the largest healthcare providers in the U.S.<\/p>\n<div id=\"attachment_50640\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171716\/ransowmare-attacks-in-2023-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50640\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171716\/ransowmare-attacks-in-2023-03.jpg\" alt=\"Map of Fortra GoAnywhere MFT servers accessible online\" width=\"1600\" height=\"696\" class=\"size-full wp-image-50640\"><\/a><p id=\"caption-attachment-50640\" class=\"wp-caption-text\">Map of GoAnywhere MFT servers connected to the internet. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>April 2023: NCR Aloha POS terminals disabled by BlackCat attack<\/h2>\n<p>\nIn April, the ALPHV group (aka BlackCat \u2014 \u00a0after the ransomware it uses) <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">attacked<\/a> NCR, a U.S. manufacturer and servicer of ATMs, barcode readers, payment terminals, and other retail and banking equipment.<\/p>\n<p>The ransomware attack shut down the data centers handling the Aloha POS platform \u2014 which is used in restaurants, primarily fast food \u2014 for several days.<\/p>\n<div id=\"attachment_50642\" style=\"width: 1090px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171727\/ransowmare-attacks-in-2023-04-fixed.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50642\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171727\/ransowmare-attacks-in-2023-04-fixed.jpg\" alt=\"NCR Aloha POS platform\" width=\"1080\" height=\"652\" class=\"size-full wp-image-50642\"><\/a><p id=\"caption-attachment-50642\" class=\"wp-caption-text\">NCR Aloha POS platform disabled by the ALPHV\/BlackCat group. <a href=\"https:\/\/www.ncr.com\/restaurants\/aloha-restaurant-pos-system\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Essentially, the platform is a one-stop shop for managing catering operations: from processing payments, taking online orders, and operating a loyalty program, to managing the preparation of dishes in the kitchen and payroll accounting. As a result of the ransomware attack on NCR, many catering establishments were <a href=\"https:\/\/www.reddit.com\/r\/alohapos\/comments\/12mfxzf\/the_great_ncr_hospitality_outage_of_2023_questions\/\" target=\"_blank\" rel=\"nofollow noopener\">forced<\/a> to revert to pen and paper.<\/p>\n<h2>May 2023: <em>Royal<\/em> ransomware attack on the City of Dallas<\/h2>\n<p>\nEarly May <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services\/\" target=\"_blank\" rel=\"nofollow noopener\">saw a ransomware attack<\/a> on municipal services in Dallas, Texas \u2014 the ninth most populous city in the U.S. Most affected were IT systems and communications of the Dallas Police Department, and printers on the City of Dallas network began churning out ransom notes.<\/p>\n<div id=\"attachment_50643\" style=\"width: 943px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171740\/ransowmare-attacks-in-2023-05.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50643\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171740\/ransowmare-attacks-in-2023-05.jpg\" alt=\"Royal ransomware extorts the City of Dallas \" width=\"933\" height=\"481\" class=\"size-full wp-image-50643\"><\/a><p id=\"caption-attachment-50643\" class=\"wp-caption-text\">The Royal ransom note printed out through City of Dallas network printers. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Later that month, there was another ransomware attack on an urban municipality: the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/blackbyte-ransomware-claims-city-of-augusta-cyberattack\/\" target=\"_blank\" rel=\"nofollow noopener\">target<\/a> this time was the City of Augusta in the U.S. state of Georgia, and the perpetrators were the BlackByte group.<\/p>\n<h2>June 2023: Clop group launches massive attacks through vulnerability in MOVEit Transfer<\/h2>\n<p>\nIn June, the same Clop group responsible for the February attacks on Fortra GoAnywhere MFT <a href=\"https:\/\/www.kaspersky.com\/blog\/moveit-transfer-attack-protection\/48598\/\" target=\"_blank\" rel=\"nofollow noopener\">began exploiting<\/a> a vulnerability in another managed file transfer tool \u2014 Progress Software\u2019s MOVEit Transfer. This vulnerability, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-34362\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2023-34362<\/a>, was disclosed and <a href=\"https:\/\/community.progress.com\/s\/article\/MOVEit-Transfer-Critical-Vulnerability-31May2023\" target=\"_blank\" rel=\"nofollow noopener\">fixed by Progress<\/a> on the last day of May, but as usual, not all clients managed to apply the patches quickly enough.<\/p>\n<p>This ransomware attack \u2014 one of the largest incidents of the year \u2014 affected numerous organizations, including the oil company <a href=\"https:\/\/www.securityweek.com\/shell-confirms-moveit-related-breach-after-ransomware-group-leaks-data\/\" target=\"_blank\" rel=\"nofollow noopener\">Shell<\/a>, the <a href=\"https:\/\/www.chalkbeat.org\/newyork\/2023\/6\/23\/23772027\/nyc-student-data-breach-security-moveit-department-education-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">New York City Department of Education<\/a>, the <a href=\"https:\/\/www.bbc.com\/news\/technology-65814104\" target=\"_blank\" rel=\"nofollow noopener\">BBC<\/a> media corporation, the British pharmacy chain Boots, the Irish airline <a href=\"https:\/\/www.dublinlive.ie\/lifestyle\/travel\/around-5000-aer-lingus-employees-27068590\" target=\"_blank\" rel=\"nofollow noopener\">Aer Lingus<\/a>, the <a href=\"https:\/\/www.fox5atlanta.com\/news\/uga-university-system-georgia-hack-moveit-russian-cybercriminals\" target=\"_blank\" rel=\"nofollow noopener\">University of Georgia<\/a>, and the German printing equipment manufacturer <a href=\"https:\/\/www.industryintel.com\/printing-and-publishing\/news\/heidelberg-data-exploited-by-international-hacker-group-through-security-hole-in-the-moveit-data-transfer-software-from-progress-company-installed-security-patch-but-found-that-files-were-stolen-and-is-working-to-determine-what-specific-data-was-affected-159186431424\" target=\"_blank\" rel=\"nofollow noopener\">Heidelberger Druckmaschinen<\/a>.<\/p>\n<div id=\"attachment_50644\" style=\"width: 1304px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171751\/ransowmare-attacks-in-2023-06.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50644\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171751\/ransowmare-attacks-in-2023-06.jpg\" alt=\"Clop demands a ransom\" width=\"1294\" height=\"452\" class=\"size-full wp-image-50644\"><\/a><p id=\"caption-attachment-50644\" class=\"wp-caption-text\">The Clop website instructs affected companies to contact the group for negotiations. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/clop-ransomware-likely-testing-moveit-zero-day-since-2021\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>July 2023: University of Hawaii pays ransom to the NoEscape group<\/h2>\n<p>\nIn July, the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hawaii-community-college-pays-ransomware-gang-to-prevent-data-leak\/\" target=\"_blank\" rel=\"nofollow noopener\">University of Hawaii<\/a> admitted to paying off ransomwarers. The incident itself occurred a month earlier when all eyes were fixed on the attacks on MOVEit. During that time, a relatively new group going by the name of NoEscape infected one of the university departments, Hawaiian Community College, with ransomware.<\/p>\n<p>Having stolen 65GB of data, the attackers threatened the university with publication. The personal information of 28,000 people was apparently at risk of compromise. It was this fact that convinced the university to pay the ransom to the extortionists.<\/p>\n<div id=\"attachment_50646\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171805\/ransowmare-attacks-in-2023-07.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50646\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171805\/ransowmare-attacks-in-2023-07.jpg\" alt=\"NoEscape ransomware attack on the University of Hawaii \" width=\"1600\" height=\"900\" class=\"size-full wp-image-50646\"><\/a><p id=\"caption-attachment-50646\" class=\"wp-caption-text\">NoEscape announces the hack of the University of Hawaii on its website. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hawaii-community-college-pays-ransomware-gang-to-prevent-data-leak\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Of note is that university staff had to temporarily shut down IT systems to stop the ransomware from spreading. Although the NoEscape group supplied a decryption key upon payment of the ransom, the restoration of the IT infrastructure was expected to take two months.<\/p>\n<h2>August 2023: Rhysida targets the healthcare sector<\/h2>\n<p>\nAugust was marked by a series of attacks by the Rhysida ransomware group on the healthcare sector. Prospect Medical Holdings (PMH), which operates 16 hospitals and 165 clinics across several American states, was the organization that suffered the most.<\/p>\n<p>The hackers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/rhysida-claims-ransomware-attack-on-prospect-medical-threatens-to-sell-data\/\" target=\"_blank\" rel=\"nofollow noopener\">claimed<\/a> to have stolen 1TB of corporate documents and a 1.3 TB SQL database containing 500,000 social security numbers, passports, driver\u2019s licenses, patient medical records, as well as financial and legal documents. The cybercriminals demanded a 50BTC ransom (then around $1.3 million).<\/p>\n<div id=\"attachment_50647\" style=\"width: 777px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171815\/ransowmare-attacks-in-2023-08.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50647\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171815\/ransowmare-attacks-in-2023-08.jpg\" alt=\"Rhysida demands a ransom\" width=\"767\" height=\"707\" class=\"size-full wp-image-50647\"><\/a><p id=\"caption-attachment-50647\" class=\"wp-caption-text\">Ransom note from the Rhysida group. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/rhysida-ransomware-behind-recent-attacks-on-healthcare\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>September 2023: BlackCat attacks Caesars and MGM casinos<\/h2>\n<p>\nIn early September, news broke of a ransomware attack on two of the biggest U.S. hotel and casino chains \u2014 <a href=\"https:\/\/www.cybersecuritydive.com\/news\/mgm-caesars-attacks-social-engineering\/693956\/\" target=\"_blank\" rel=\"nofollow noopener\">Caesars and MGM<\/a> \u2014 in one stroke. Behind the attacks was the ALPHV\/BlackCat group, mentioned above in connection with the assault on the NCR Aloha POS platform.<\/p>\n<p>The incident shut down the companies\u2019 entire infrastructure \u2014 from hotel check-in systems to slot machines. Interestingly, the victims responded in very different ways. Caesars decided to pay the extortionists $15 million, half of the original $30 million demand.<\/p>\n<p>MGM <a href=\"https:\/\/www.itbrew.com\/stories\/2023\/10\/12\/cyberattack-cost-mgm-resorts-usd100-million-despite-refusing-to-pay-ransom\" target=\"_blank\" rel=\"nofollow noopener\">chose not to pay up<\/a>, but rather to restore the infrastructure on its own. The recovery process took nine days, during which time the company <a href=\"https:\/\/www.sec.gov\/ixviewer\/ix.html?doc=\/Archives\/edgar\/data\/789570\/000119312523251667\/d461062d8k.htm\" target=\"_blank\" rel=\"nofollow noopener\">lost $100\u00a0million<\/a> (its own estimate), of which $10\u00a0million was direct costs related to restoring the downed IT systems.<\/p>\n<div id=\"attachment_50648\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171830\/ransowmare-attacks-in-2023-09.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50648\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171830\/ransowmare-attacks-in-2023-09.jpg\" alt=\"BlackCat ransomware attacks on Caesars and MGM\" width=\"1460\" height=\"975\" class=\"size-full wp-image-50648\"><\/a><p id=\"caption-attachment-50648\" class=\"wp-caption-text\">Caesars and MGM own more than half of Las Vegas casinos<\/p><\/div>\n<h2>October 2023: BianLian group extorts Air Canada<\/h2>\n<p>\nA month later, the BianLian group <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bianlian-extortion-group-claims-recent-air-canada-breach\/\" target=\"_blank\" rel=\"nofollow noopener\">targeted<\/a> Canada\u2019s flag carrier, Air Canada. The attackers claim they stole more than 210GB of various information, including employee\/supplier data and confidential documents. In particular, the attackers managed to steal information on technical violations and security issues of the airline.<\/p>\n<div id=\"attachment_50649\" style=\"width: 984px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171841\/ransowmare-attacks-in-2023-10.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50649\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171841\/ransowmare-attacks-in-2023-10.jpg\" alt=\"BianLian extorts Air Canada\" width=\"974\" height=\"504\" class=\"size-full wp-image-50649\"><\/a><p id=\"caption-attachment-50649\" class=\"wp-caption-text\">The BianLian website demands a ransom from Air Canada <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bianlian-extortion-group-claims-recent-air-canada-breach\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<h2>November 2023: LockBit group exploits Citrix Bleed vulnerability<\/h2>\n<p>\nNovember was remembered for a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-exploits-citrix-bleed-in-attacks-10k-servers-exposed\/\" target=\"_blank\" rel=\"nofollow noopener\">Citrix Bleed vulnerability<\/a> exploited by the LockBit group, which we also discussed above. Although patches for this vulnerability were published a month earlier, at the time of the large-scale attack more than 10,000 publicly accessible servers remained vulnerable. This is what the LockBit ransomware took advantage of to breach the systems of several major companies, steal data, and encrypt files.<\/p>\n<p>Among the big-name victims was <a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/boeing-data-published-by-lockbit-hacking-gang-2023-11-10\/\" target=\"_blank\" rel=\"nofollow noopener\">Boeing<\/a>, whose stolen data the attackers ended up publishing without waiting for the ransom to be paid. The ransomware also hit the <a href=\"https:\/\/therecord.media\/icbc-dealing-with-ransomware-attack\" target=\"_blank\" rel=\"nofollow noopener\">Industrial and Commercial Bank of China<\/a> (ICBC), the largest commercial bank in the world.<\/p>\n<div id=\"attachment_50650\" style=\"width: 2638px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171901\/ransowmare-attacks-in-2023-11.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50650\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171901\/ransowmare-attacks-in-2023-11.png\" alt=\"LockBit extorts Boeing\" width=\"2628\" height=\"1794\" class=\"size-full wp-image-50650\"><\/a><p id=\"caption-attachment-50650\" class=\"wp-caption-text\">The LockBit website demands a ransom from Boeing<\/p><\/div>\n<p>The incident badly hurt the Australian arm of <a href=\"https:\/\/www.afr.com\/companies\/transport\/hackers-stole-dp-world-data-patch-lapse-blamed-20231115-p5ek7g\" target=\"_blank\" rel=\"nofollow noopener\">DP World<\/a>, a major UAE-based logistics company that operates dozens of ports and container terminals worldwide. The attack on DP World Australia\u2019s IT systems massively disrupted its logistics operations, leaving some 30,000 containers stranded in Australian ports.<\/p>\n<h2>December 2023: ALPHV\/BlackCat infrastructure seized by law enforcement<\/h2>\n<p>\nToward the end of the year, a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-alphv-ransomware-raked-in-300-million-from-over-1-000-victims\/\" target=\"_blank\" rel=\"nofollow noopener\">joint operation<\/a> by the FBI, the U.S. Department of Justice, Europol, and law enforcement agencies of several European countries deprived the ALPHV\/BlackCat ransomware group of control over its infrastructure. Having hacked it, they quietly observed the cybercriminals\u2019 actions for several months, collecting data decryption keys and aiding BlackCat victims.<\/p>\n<p>In this way, the agencies rid more than 500 organizations worldwide of the ransom threat and saved around $68 million in potential payouts. This was followed in December by a final takeover of the servers, putting an end to BlackCat\u2019s operations.<\/p>\n<div id=\"attachment_50651\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171918\/ransowmare-attacks-in-2023-12.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50651\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/02\/20171918\/ransowmare-attacks-in-2023-12.jpg\" alt=\"The end of ALPHV\/BlackCat activity\" width=\"1600\" height=\"1179\" class=\"size-full wp-image-50651\"><\/a><p id=\"caption-attachment-50651\" class=\"wp-caption-text\">The joint law enforcement operation to seize ALPHV\/BlackCat infrastructure. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-alphv-ransomware-raked-in-300-million-from-over-1-000-victims\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Various statistics about the ransomware group\u2019s operations were also made public. According to the FBI, during the two years of its activity, ALPHV\/BlackCat breached more than a thousand organizations, demanded a total of more than $500 million from victims, and received around $300 million in ransom payments.<\/p>\n<h2>How to guard against ransomware attacks<\/h2>\n<p>\nRansomware attacks are becoming more varied and sophisticated with each passing year, so there isn\u2019t (and can\u2019t be) one killer catch-all tip to prevent incidents. Defense measures must be comprehensive. Focus on the following tasks:\n<\/p>\n<ul>\n<li>Train employees in <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">cybersecurity awareness<\/a>.<\/li>\n<li>Implement and refine data storage and <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-the-principle-of-least-privilege\/50232\/\" target=\"_blank\" rel=\"noopener nofollow\">employee access<\/a>\n<\/li>\n<li>Back up important data regularly and isolate it from the network.<\/li>\n<li>Install <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">robust protection on all corporate devices<\/a>.<\/li>\n<li>Monitor suspicious activity on the corporate network using an <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Endpoint Detection and Response (EDR)<\/a><\/li>\n<li>Outsource <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">threat search and response to a specialist company<\/a> if your in-house information security lacks the capability.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>A look at the biggest ransomware attacks of 2023.<\/p>\n","protected":false},"author":2726,"featured_media":22420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[1457,519,1183,433,1022,97,521,268],"class_list":{"0":"post-22417","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-business","10":"tag-hacks","11":"tag-leaks","12":"tag-ransomware","13":"tag-risks","14":"tag-security-2","15":"tag-threats","16":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransowmare-attacks-in-2023\/22417\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransowmare-attacks-in-2023\/27107\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransowmare-attacks-in-2023\/29781\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransowmare-attacks-in-2023\/27283\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransowmare-attacks-in-2023\/37006\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransowmare-attacks-in-2023\/50634\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransommare-attacks-in-2023\/35858\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransowmare-attacks-in-2023\/27479\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransowmare-attacks-in-2023\/33289\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransowmare-attacks-in-2023\/32913\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ransomware\/","name":"ransomware"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22417"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22417\/revisions"}],"predecessor-version":[{"id":22422,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22417\/revisions\/22422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22420"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}