{"id":90971,"date":"2020-04-28T09:00:49","date_gmt":"2020-04-28T16:00:49","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90971"},"modified":"2023-08-10T14:15:35","modified_gmt":"2023-08-10T21:15:35","slug":"ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/28\/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk\/","title":{"rendered":"Ransomware groups continue to target healthcare, critical services; here\u2019s how to reduce risk"},"content":{"rendered":"

At a time when remote work is becoming universal and the strain on SecOps, especially in healthcare and critical industries, has never been higher, ransomware actors are unrelenting, continuing their normal operations. Multiple ransomware groups that have been accumulating access and maintaining persistence on target networks for several months activated dozens of ransomware deployments in the first two weeks of April 2020.<\/p>\n\n\n\n
Additional resources<\/em><\/strong><\/p>\n

Protect your organization against ransomware: aka.ms\/ransomware<\/a><\/em><\/p>\n

Learn how attackers operate: Human-operated ransomware attacks: A preventable disaster<\/a><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

So far the attacks have affected aid organizations, medical billing companies, manufacturing, transport, government institutions, and educational software providers, showing that these ransomware groups give little regard to the critical services they impact, global crisis notwithstanding. These attacks, however, are not limited to critical services, so organizations should be vigilant for signs of compromise.<\/p>\n

The ransomware deployments in this two-week period appear to cause a slight uptick in the volume of ransomware attacks. However, Microsoft security intelligence as well as forensic data from relevant incident response engagements by Microsoft Detection and Response Team (DART) showed that many of the compromises that enabled these attacks occurred earlier. Using an attack pattern typical of human-operated ransomware<\/a> campaigns, attackers have compromised target networks for several months beginning earlier this year and have been waiting to monetize their attacks by deploying ransomware when they would see the most financial gain.<\/p>\n

Many of these attacks started with the exploitation of vulnerable internet-facing network devices; others used brute force to compromise RDP servers. The attacks delivered a wide range of payloads, but they all used the same techniques observed in human-operated ransomware campaigns: credential theft and lateral movement, culminating in the deployment of a ransomware payload of the attacker\u2019s choice. Because the ransomware infections are at the tail end of protracted attacks, defenders should focus on hunting for signs of adversaries performing credential theft and lateral movement activities to prevent the deployment of ransomware.<\/p>\n

In this blog, we share our in-depth analysis of these ransomware campaigns. Below, we will cover:<\/p>\n