Heimdal Security Blog

Organizations Attacked by Ransomware Actors During Purchasing and Merging Events, FBI Warns

The FBI alerts that threat actors behind ransomware campaigns are attacking organizations taking part in significant financial events such as corporate fusions and acquisitions, in order to extort their targets more easily.

On Monday, the FBI issued a private industry notification alerting that ransomware threat actors would take advantage of the financial data obtained prior to attacks as leverage to pressure victims into paying the requested ransom.

FBI declared:

The FBI assesses ransomware actors are very likely using significant financial events, such as mergers and acquisitions, to target and leverage victim companies for ransomware infections.

During the initial reconnaissance phase, cyber criminals identify non-publicly available information, which they threaten to release or use as leverage during the extortion to entice victims to comply with ransom demands.

Impending events that could affect a victim’s stock value, such as announcements, mergers, and acquisitions, encourage ransomware actors to target a network or adjust their timeline for extortion where access is established.

Source

As mentioned by BleepingComputer, a year ago, the REvil (Sodinokibi) cybercrime group stated that they were thinking of adding an auto-email script that would notify stock exchanges, such as NASDAQ, that organizations had been affected by ransomware to impact their stock price.

In April 2021, DarkSide ransomware declared that it will provide insider information about firms listed on the NASDAQ or other stock exchanges with traders looking to earn a quick profit by shorting the stock price.

The FBI also gave some examples of ransomware gangs targeting vulnerable businesses using inside or public information about existing merger or acquisition discussions:

As usual, the FBI advises against paying a ransom to threat actors. Paying a ransom encourages them to target even more enterprises. Paying the ransom also does not ensure the recovery of a victim’s files.

Nevertheless, the FBI understands that when a company is unable to operate, managers might consider all options in order to protect their shareholders, staff, and clients.

Whether or not you or your company choose to pay the ransom, the FBI recommends that you report ransomware attacks to your local FBI field office.

FBI Recommendations:

How Can Heimdal™ Help?

In the fight against ransomware, Heimdal™ Security is offering its customers an outstanding integrated cybersecurity suite including the Ransomware Encryption Protection module, that is universally compatible with any antivirus solution, and is 100% signature-free, ensuring superior detection and remediation of any type of ransomware, whether fileless or file-based (including the most recent ones like LockFile).

Neutralize ransomware before it can hit.

Heimdal™ Ransomware Encryption Protection

Specifically engineered to counter the number one security risk to any business – ransomware.
  • Blocks any unauthorized encryption attempts;
  • Detects ransomware regardless of signature;
  • Universal compatibility with any cybersecurity solution;
  • Full audit trail with stunning graphics;
Try it for FREE today 30-day Free Trial. Offer valid only for companies.

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.