www.cisa.gov Open in urlscan Pro
2a02:26f0:3500:88d::447a  Public Scan

Submitted URL: https://www.cisa.gov/uscert/ncas/alerts/aa22-181a
Effective URL: https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-181a
Submission: On June 09 via api from IN — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   Locally
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Contact Us
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home
 2. News & Events
 3. Cybersecurity Advisories
 4. Cybersecurity Advisory

Share:


Cybersecurity Advisory


#STOPRANSOMWARE: MEDUSALOCKER

Last Revised
August 11, 2022
Alert Code
AA22-181A



SUMMARY

Actions to take today to mitigate cyber threats from ransomware:
• Prioritize remediating known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce multifactor authentication.

Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing
#StopRansomware effort to publish advisories for network defenders that detail
various ransomware variants and ransomware threat actors. These #StopRansomware
advisories include recently and historically observed tactics, techniques, and
procedures (TTPs) and indicators of compromise (IOCs) to help organizations
protect against ransomware. Visit stopransomware.gov to see all #StopRansomware
advisories and to learn more about other ransomware threats and no-cost
resources.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure
Security Agency (CISA), the Department of the Treasury, and the Financial Crimes
Enforcement Network (FinCEN) are releasing this CSA to provide information on
MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors
predominantly rely on vulnerabilities in Remote Desktop Protocol (RDP) to access
victims’ networks. The MedusaLocker actors encrypt the victim's data and leave a
ransom note with communication instructions in every folder containing an
encrypted file. The note directs victims to provide ransomware payments to a
specific Bitcoin wallet address. MedusaLocker appears to operate as a
Ransomware-as-a-Service (RaaS) model based on the observed split of ransom
payments. Typical RaaS models involve the ransomware developer and various
affiliates that deploy the ransomware on victim systems. MedusaLocker ransomware
payments appear to be consistently split between the affiliate, who receives 55
to 60 percent of the ransom; and the developer, who receives the remainder. 

Download the PDF version of this report: pdf, 633 kb


TECHNICAL DETAILS

MedusaLocker ransomware actors most often gain access to victim devices through
vulnerable Remote Desktop Protocol (RDP) configurations [T1133(link is
external)]. Actors also frequently use email phishing and spam email
campaigns—directly attaching the ransomware to the email—as initial intrusion
vectors [T1566(link is external)].

MedusaLocker ransomware uses a batch file to execute PowerShell script
invoke-ReflectivePEInjection [T1059.001(link is external)]. This script
propagates MedusaLocker throughout the network by editing the
EnableLinkedConnections value within the infected machine’s registry, which then
allows the infected machine to detect attached hosts and networks via Internet
Control Message Protocol (ICMP) and to detect shared storage via Server Message
Block (SMB) Protocol. 

MedusaLocker then: 

 * Restarts the LanmanWorkstation service, which allows registry edits to take
   effect. 
 * Kills the processes of well-known security, accounting, and forensic
   software. 
 * Restarts the machine in safe mode to avoid detection by security software
   [T1562.009(link is external)].
 * Encrypts victim files with the AES-256 encryption algorithm; the resulting
   key is then encrypted with an RSA-2048 public key [T1486(link is external)]. 
 * Runs every 60 seconds, encrypting all files except those critical to the
   functionality of the victim’s machine and those that have the designated
   encrypted file extension. 
 * Establishes persistence by copying an executable (svhost.exe or svhostt.exe)
   to the %APPDATA%\Roaming directory and scheduling a task to run the
   ransomware every 15 minutes. 
 * Attempts to prevent standard recovery techniques by deleting local backups,
   disabling startup recovery options, and deleting shadow copies [T1490(link is
   external)].

MedusaLocker actors place a ransom note into every folder containing a file with
the victim's encrypted data. The note outlines how to communicate with the
MedusaLocker actors, typically providing victims one or more email address at
which the actors can be reached. The size of MedusaLocker ransom demands appears
to vary depending on the victim’s financial status as perceived by the actors. 
 

INDICATORS OF COMPROMISE



Encrypted File Extensions Encrypted File Extensions .1btc .matlock20 .marlock02
.readinstructions .bec .mylock .jpz.nz .marlock11 .cn .NET1 .key1 .fileslocked
.datalock .NZ .lock .lockfilesUS .deadfilesgr .tyco .lockdata7 .rs .faratak
.uslockhh .lockfiles .tyco .fileslock .zoomzoom .perfection .uslockhh .marlock13
n.exe .Readinstruction .marlock08 .marlock25 nt_lock20 .READINSTRUCTION  
.marlock6 .marlock01 .ReadInstructions  

 

Ransom Note File Names how_to_ recover_data.html 
how_to_recover_data.html.marlock01 instructions.html  READINSTRUCTION.html 
!!!HOW_TO_DECRYPT!!! How_to_recovery.txt readinstructions.html 
readme_to_recover_files recovery_instructions.html  HOW_TO_RECOVER_DATA.html
recovery_instruction.html  

 

Payment Wallets 14oxnsSc1LZ5M2cPZeQ9rFnXqEvPCnZikc 
1DRxUFhvJjGUdojCzMWSLmwx7Qxn79XbJq  18wRbb94CjyTGkUp32ZM7krCYCB9MXUq42 
1AbRxRfP6yHePpi7jmDZkS4Mfpm1ZiatH5 1Edcufenw1BB4ni9UadJpQh9LVx9JGtKpP
1DyMbw6R9PbJqfUSDcK5729xQ57yJrE8BC  184ZcAoxkvimvVZaj8jZFujC7EwR3BKWvf 
14oH2h12LvQ7BYBufcrY5vfKoCq2hTPoev bc1qy34v0zv6wu0cugea5xjlxagsfwgunwkzc0xcjj
bc1q9jg45a039tn83jk2vhdpranty2y8tnpnrk9k5q
bc1qz3lmcw4k58n79wpzm550r5pkzxc2h8rwmmu6xm 1AereQUh8yjNPs9Wzeg1Le47dsqC8NNaNM
1DeNHM2eTqHp5AszTsUiS4WDHWkGc5UxHf 1HEDP3c3zPwiqUaYuWZ8gBFdAQQSa6sMGw
1HdgQM9bjX7u7vWJnfErY4MWGBQJi5mVWV 1nycdn9ebxht4tpspu4ehpjz9ghxlzipll
12xd6KrWVtgHEJHKPEfXwMVWuFK4k1FCUF 1HZHhdJ6VdwBLCFhdu7kDVZN9pb3BWeUED
1PormUgPR72yv2FRKSVY27U4ekWMKobWjg 14cATAzXwD7CQf35n8Ea5pKJPfhM6jEHak
1PopeZ4LNLanisswLndAJB1QntTF8hpLsD

 

Email Addresses willyhill1960@tutanota[.]com  unlockfile@cock[.]li
zlo@keem[.]ne  unlockmeplease@airmail[.]cc  zlo@keemail[.]me 
unlockmeplease@protonmail[.]com  zlo@tfwno[.]gf  willyhill1960@protonmail[.]com 
support@ypsotecs[.]com support@imfoodst[.]com 

 

Email Addresses traceytevin@protonmail[.]com  support@itwgset[.]com
unlock_file@aol[.]com  support@novibmaker[.]com unlock_file@outlook[.]com 
support@securycasts[.]com  support@exoprints[.]com
rewmiller-1974@protonmail[.]com support@exorints[.]com  rpd@keemail[.]me
support@fanbridges[.]com  soterissylla@wyseil[.]com  support@faneridges[.]com
support@careersill[.]com  perfection@bestkoronavirus[.]com 
karloskolorado@tutanota[.]com pool1256@tutanota[.]com 
kevynchaz@protonmail[.]com  rapid@aaathats3as[.]com korona@bestkoronavirus[.]com
rescuer@tutanota[.]com lockPerfection@gmail[.]com ithelp01@decorous[.]cyou
lockperfection@gmail[.]com  ithelp01@wholeness[.]business
mulierfagus@rdhos[.]com ithelp02@decorous[.]cyou [rescuer]@cock[.]li 
ithelp02@wholness[.]business 107btc@protonmail[.]com 
ithelpresotre@outlook[.]com 33btc@protonmail[.]com  cmd@jitjat[.]org 
777decoder777@protonmail[.]com coronaviryz@gmail[.]com 777decoder777@tfwno[.]gf
dec_helper@dremno[.]com andrewmiller-1974@protonmail[.]com
dec_helper@excic[.]com  angelomartin-1980@protonmail[.]com
dec_restore@prontonmail[.]com  ballioverus@quocor[.]com
dec_restore1@outlook[.]com beacon@jitjat[.]org bitcoin@sitesoutheat[.]com 
beacon@msgsafe[.]io briansalgado@protonmail[.]com best666decoder@tutanota[.]com 
bugervongir@outlook[.]com bitcoin@mobtouches[.]com 
best666decoder@protonmail[.]com  encrypt2020@outlook[.]com 
decoder83540@cock[.]li fast-help@inbox[.]lv decra2019@gmail[.]com 
fuc_ktheworld1448@outlook[.]com diniaminius@winrof[.]com 
fucktheworld1448@cock[.]li dirhelp@keemail[.]me 
gartaganisstuffback@gmail[.]com 

 

Email Addresses emaila.elaich@iav.ac[.]ma gavingonzalez@protonmail[.]com
emd@jitjat[.]org gsupp@onionmail[.]org encrypt2020@cock[.]li 
gsupp@techmail[.]info best666decoder@protonmail[.]com  helper@atacdi[.]com 
ithelp@decorous[.]cyou helper@buildingwin[.]com  ithelp@decorous[.]cyoum
helprestore@outlook[.]com ithelp@wholeness[.]business
helptorestore@outlook[.]com

 

TOR Addresses
http://gvlay6u4g53rxdi5.onion/6-iSm1B1Ehljh8HYuXGym4Xyu1WdwsR2Av-6tXiw1BImsqoLh7pd207Rl6XYoln7sId 
http://gvlay6u4g53rxdi5.onion/8-grp514hncgblilsjtd32hg6jtbyhlocr5pqjswxfgf2oragnl3pqno6fkqcimqin
http://gvlay6y4g53rxdi5.onion/21-8P4ZLCsMETPaLw9MkSlXJsNZWdHe0rxjt-XmBgZLWlm5ULGFCOJFuVdEymmxysofwu
http://gvlay6u4g53rxdi5.onion/2l-8P4ZLCsMTPaLw9MkSlXJsNZWdHeOrxjtE9lck1MuXPYo29daQys6gomZZXUImN7Z 
http://gvlay6u4g53rxdi5.onion/21-8P4ZLCsMTPaLw9MkSlXJsNZWdHe0rxjt-DcaE9HeHywqSHvdcIwOndCS4PuWASX8g 
http://gvlay6u4g53rxdi5.onion/21-8P4ZLCsMTPaLw9MkSlXJsNZWdHe0rxjt-kB4rQXGKyxGiLyw7YDsMKSBjyfdwcyxo
http://gvlay6u4g53rxdi5.onion/21-8P4ZLCsMTPaLw9MkSlXJsNZWdHe0rxjt-bET6JbB9vEMZ7qYBPqUMCxOQExFx4iOi 
http://gvlay6u4g53rxdi5.
onion/8-MO0Q7O97Hgxvm1YbD7OMnimImZJXEWaG-RbH4TvdwVTGQB3X6VOUOP3lgO6YOJEOW
http://gvlay6u4g53rxdi5.onion/8-gRp514hncgb1i1sjtD32hG6jTbUh1ocR-Uola2Fo30KTJvZX0otYZgTh5txmKwUNe 
http://gvlay6u4g53rxdi5.onion/21-E6UQFCEuCn4KvtAh4TonRTpyHqFo6F6L-OWQwD1w1Td7hY7IGUUjxmHMoFSQW6blg 
http://gvlay6u4g53rxdi5.onion/21-E6UQFCEuCn4KvtAh4TonRTpyHqFo6F6L-uGHwkkWCoUtBbZWN50sSS4Ds8RABkrKy 
http://gvlay6u4g53rxdi5.onion/21-E6UQFCEuCn4KvtAh4TonRTpyHqFo6F6L-Tj3PRnQlpHc9OftRVDGAWUulvE80yZbc 
http://gvlay6u4g53rxdi5.onion/8-Ww5sCBhsL8eM4PeAgsfgfa9lrqa81r31-tDQRZCAUe4164X532j9Ky16IBN9StWTH 
http://gvlay6u4g53rxdi5.onion/21-wIq5kK9gGKiTmyups1U6fABj1VnXIYRB-I5xek6PG2EbWlPC7C1rXfsqJBlWlFFfY
qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion
http://medusacegu2ufmc3kx2kkqicrlcxdettsjcenhjena6uannk5f4ffuyd.onion/leakdata/[REDACTED]

Disclaimer: Many of these observed IP addresses are several years old and have
been historically linked to MedusaLocker ransomware. We recommend these IP
addresses be investigated or vetted by organizations prior to taking action,
such as blocking.

IP Address Last Observed 195.123.246.138 Nov-2021 138.124.186.221 Nov-2021
159.223.0.9 Nov-2021 45.146.164.141 Nov-2021 185.220.101.35 Nov-2021
185.220.100.249 Sep-2021 50.80.219.149 Sep-2021 185.220.101.146 Sep-2021
185.220.101.252 Sep-2021 179.60.150.97 Sep-2021 84.38.189.52 Sep-2021
94.232.43.63 Jul-2021 108.11.30.103 Apr-2021 194.61.55.94 Apr-2021
198.50.233.202 Apr-2021 40.92.90.105 Jan-2021 188.68.216.23 Dec-2020
87.251.75.71 Dec-2020 196.240.57.20 Oct-2020 198.0.198.5 Aug-2020 194.5.220.122
Mar-2020 194.5.250.124 Mar-2020 194.5.220.124 Mar-2020 104.210.72.161 Nov-2019

 


MITRE ATT&CK TECHNIQUES

MedusaLocker actors use the ATT&CK techniques listed in Table 1.

Table 1: MedusaLocker Actors ATT&CK Techniques for Enterprise

Initial Access Technique Title ID Use External Remote Services T1133
MedusaLocker actors gained access to victim devices through vulnerable RDP
configurations. Phishing T1566 MedusaLocker actors used phishing and
spearphishing to obtain access to victims' networks. Execution Technique Title
ID Use Command and Scripting Interpreter: PowerShell

T1059.001

MedusaLocker actors may abuse PowerShell commands and scripts for execution.
Defense Evasion Technique Title ID Use Impair Defenses: Safe Mode Boot

T1562.009

MedusaLocker actors may abuse Windows safe mode to disable endpoint defenses.
Safe mode starts up the Windows operating system with a limited set of drivers
and services. Impact Technique Title ID Use Data Encrypted for Impact T1486
MedusaLocker actors encrypt data on target systems or on large numbers of
systems in a network to interrupt availability to system and network resources.
Inhibit System Recovery T1490 MedusaLocker actors may deny access to operating
systems containing features that can help fix corrupted systems, such as backup
catalog, volume shadow copies, and automatic repair.

 


MITIGATIONS

 * Implement a recovery plan that maintains and retains multiple copies of
   sensitive or proprietary data and servers in a physically separate,
   segmented, and secure location (i.e., hard drive, storage device, or the
   cloud).
 * Implement network segmentation and maintain offline backups of data to ensure
   limited interruption to the organization.
 * Regularly back up data and password protect backup copies stored offline.
   Ensure copies of critical data are not accessible for modification or
   deletion from the system where the data resides.
 * Install, regularly update, and enable real time detection for antivirus
   software on all hosts.
 * Install updates for operating systems, software, and firmware as soon as
   possible.
 * Review domain controllers, servers, workstations, and active directories for
   new and/or unrecognized accounts.
 * Audit user accounts with administrative privileges and configure access
   controls according to the principle of least privilege. 
 * Disable unused ports.
 * Consider adding an email banner to emails received from outside your
   organization.
 * Disable hyperlinks in received emails.
 * Enforce multifactor authentication (MFA).
 * Use National Institute of Standards and Technology (NIST) standards for
   developing and managing password policies:
   * Use longer passwords consisting of at least 8 characters and no more than
     64 characters in length.
   * Store passwords in hashed format using industry-recognized password
     managers.
   * Add password user “salts” to shared login credentials.
   * Avoid reusing passwords.
   * Implement multiple failed login attempt account lockouts.
   * Disable password “hints”.
   * Refrain from requiring password changes unless there is evidence of
     password compromise. Note: NIST guidance suggests favoring longer passwords
     and no longer require regular and frequent password resets. Frequent
     password resets are more likely to result in users developing password
     “patterns” cyber criminals can easily decipher.
   * Require administrator credentials to install software.
 * Only use secure networks; avoid using public Wi-Fi networks.
 * Consider installing and using a virtual private network (VPN) to establish
   secure remote connections.
 * Focus on cybersecurity awareness and training. Regularly provide users with
   training on information security principles and techniques as well as overall
   emerging cybersecurity risks and vulnerabilities, such as ransomware and
   phishing scams.


 
RESOURCES

 * Stopransomware.gov is a whole-of-government approach that gives one central
   location for ransomware resources and alerts.
 * Resource to mitigate a ransomware attack: CISA-Multi-State Information
   Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide
 * No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware
   Readiness Assessment


REPORTING

 * To report an incident and request technical assistance, contact CISA at
   cisaservicedesk@cisa.dhs.gov(link sends email) or 888-282-0870, or FBI
   through a local field office. 
 * Financial Institutions must ensure compliance with any applicable Bank
   Secrecy Act requirements, including suspicious activity reporting
   obligations. Indicators of compromise (IOCs), such as suspicious email
   addresses, file names, hashes, domains, and IP addresses, can be provided
   under Item 44 of the Suspicious Activity Report (SAR) form. For more
   information on mandatory and voluntary reporting of cyber events via SARs,
   see FinCEN Advisory FIN-2016-A005, Advisory to Financial Institutions on
   Cyber-Events and Cyber-Enabled Crime, October 25, 2016; and FinCEN Advisory
   FIN-2021-A004, Advisory on Ransomware and the Use of the Financial System to
   Facilitate Ransom Payments, November 8, 2021, which updates FinCEN Advisory
   FIN-2020-A006.
 * The U.S. Department of State’s Rewards for Justice (RFJ) program offers a
   reward of up to $10 million for reports of foreign government malicious
   activity against U.S. critical infrastructure. See the RFJ website for more
   information and how to report information securely.


CONTACT INFORMATION

To report suspicious or criminal activity related to information found in this
Joint Cybersecurity Advisory, contact your local FBI field office at
www.fbi.gov/contact-us/field-offices. When available, please include the
following information regarding the incident: date, time, and location of the
incident; type of activity; number of people affected; type of equipment used
for the activity; the name of the submitting company or organization; and a
designated point of contact. To report incidents and anomalous activity or to
request incident response resources or technical assistance related to this
threat, contact CISA at report@cisa.gov(link sends email).


REVISIONS

June 30, 2022: Initial Version


PLEASE SHARE YOUR THOUGHTS

We recently updated our anonymous product survey; we’d welcome your feedback.


RELATED ADVISORIES

Jun 07, 2023
Cybersecurity Advisory | AA23-158A


#STOPRANSOMWARE: CL0P RANSOMWARE GANG EXPLOITS CVE-2023-34362 MOVEIT
VULNERABILITY

May 24, 2023
Cybersecurity Advisory | AA23-144a


PEOPLE'S REPUBLIC OF CHINA STATE-SPONSORED CYBER ACTOR LIVING OFF THE LAND TO
EVADE DETECTION

May 16, 2023
Cybersecurity Advisory | AA23-136A


#STOPRANSOMWARE: BIANLIAN RANSOMWARE GROUP

May 11, 2023
Cybersecurity Advisory | AA23-131A


MALICIOUS ACTORS EXPLOIT CVE-2023-27350 IN PAPERCUT MF AND NG

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 Central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback