icon

Digital safety starts here for both commercial and personal Use...

Defend Your Business Against the Latest WNY Cyber Threats We offer Safe, Secure and Affordable Solutions for your Business and Personal Networks and Devices.



WNYCyber is there to help you to choose the best service providers in Western New York... We DO NOT provide the services ourselves, as we are Internet Programmers who have to deak daily with Cyber Threats... (Ugghhh)... So we know what it's like and what it takes to protect OUR and OUR CUSTOMERS DATA... We built this Website to help steer you to those that can give you the best service at realistic and non-inflated prices. We do charge or collect any fees.

Critical Infrastructure Organizations Warned of Phobos Ransomware Attacks

Summary:
CISA, the FBI, and MS-ISAC have released a joint advisory warning against ongoing Phobos ransomware attacks targeting government, education, emergency services, healthcare, and other critical infrastructure sectors. The advisory includes TTPs employed by Phobos ransomware, including how the group conducts reconnaissance and gains initial access to victim environments, as well as various methods used to maintain persistence, escalate privileges, and encrypt files for impact. The agencies have also provided a set of recommendation measures as well as IOCs which can be used by organizations to defend against potential Phobos ransomware attacks.

Security Officer Comments:
Like most cybercriminal operations Phobos employs spear-phishing attachments to infect potential victims. According to the agencies, these actors will conduct scans using tools like Angry IP Scanner to look for vulnerable RDP ports, which when found are exploited for initial access to victim environments. After the initial entry is secured, the actors will modify firewall configurations and Registry keys to evade defenses and maintain persistence, which is followed by the deployment of various payloads that lead to the execution of the gang’s encryptor. To ensure victims can’t recover their files, Phobos will also identify and delete data backups.

Suggested Corrections:
To mitigate Phobos ransomware activity, organizations have been advised to:
  • Secure RDP ports to prevent threat actors from abusing and leveraging RDP tools.
  • Prioritize remediating known exploited vulnerabilities.
  • Implement EDR solutions to disrupt threat actor memory allocation techniques.
Link(s):
https://www.securityweek.com/critic...izations-warned-of-phobos-ransomware-attacks/
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a