Overview
Over the past few months, we have closely monitored the evolving landscape of cyber threats and attacks targeting the United States. Our findings indicate a significant surge in ransomware incidents from June to October 2024, impacting over 800 victims across various sectors, with a notable concentration in Business Services and Manufacturing. The Play ransomware group has emerged as the most active threat actor during this period, alongside other notable groups such as RansomHub, Lockbit, Qilin, and Meow. These groups have primarily targeted critical infrastructure, capitalizing on existing vulnerabilities to execute their attacks.
Significant incidents, such as the Rhysida ransomware attack on the City of Columbus, resulted in the compromise of sensitive data, underscoring the urgent need for enhanced security measures. Furthermore, several high-profile data breaches have affected key institutions, including TIDE, Virginia's Department of Elections, and Healthcare.gov, with threat actors selling sensitive personal information and RDP access on underground forums. We have also included the top initial attack vectors (IAVs) used by these threat actors, which include phishing emails and the exploitation of software vulnerabilities, enabling unauthorized access to critical systems.
In addition to these attacks, our report highlights China's espionage campaign, dubbed "Salt Typhoon," which is targeting the U.S. Internet Service Providers (ISPs). We also observed hacktivist activities from various groups advocating pro-Palestinian and pro-Russian positions, further complicating the cyber threat landscape.
The effects of these cyber threats extend beyond immediate financial losses, impacting public trust and the resilience of critical infrastructure across all sectors. Continuous monitoring and analysis of threat actor tactics are essential for organizations to stay ahead of potential attacks. By understanding these patterns, businesses can implement proactive measures to enhance their defenses and protect sensitive information. Investing in cybersecurity is crucial not only for safeguarding assets but also for maintaining the stability of the broader economy.
Recent Cyber Attacks on the United States
Ransomware:
In the United States, ransomware attacks have had a significant impact across various sectors, with over 800 victims reported from June to now. Numerous ransomware groups are behind these attacks, with the Play ransomware group being the most prominent. These cyberattacks have affected a wide range of industries, causing major disruptions and financial losses.
The charts below provide statistics that illustrate the sectors impacted by ransomware in the United States over the past five months. You'll also find data on the active ransomware groups during this period and monthly statistics on ransomware attacks.
In the past five months, ransomware attacks have significantly impacted various industries across the United States. The most affected sectors include:
In addition to these, several other sectors have also been affected, including Retail, Finance & Banking, Real Estate, FMCG, Hospitality, Energy, Oil & Gas, Agriculture, Media, Entertainment & Marketing, Environmental Services, Food & Beverage, Communication, Insurance, Automobile, Telecommunications, Legal, E-commerce, and Export/Import. This highlights the widespread nature of ransomware threats across multiple industries.
Top 5 active ransomware groups targeting the United States in last 5 months:
In the past five months, ransomware attacks in the United States increased from 175 in June 2024 to 214 in July, peaked at 217 in August, and then decreased to 199 in September, with 66 attacks reported so far in October 2024.
City of Columbus Targeted by Rhysida Ransomware
On July 31, 2024, Rhysida ransomware listed the City of Columbus, Ohio, as a victim on their leak site. The group exfiltrated 6.5TB of data, which included internal employee logins and passwords, a complete dump of servers housing emergency services applications, and access to city video camera feeds. Rhysida claimed that 55% of the stolen data was sold, while the remaining 45% was uploaded to their leak site for free and was not part of the sale. The attack on the City of Columbus poses significant risks, including potential exposure of sensitive employee information, disruption of emergency services, and compromised security of city surveillance systems.
Data Breaches:
This section highlights recent significant data breaches affecting the United States, focusing on the compromised databases of key institutions and the sale of sensitive personal information. These incidents underscore the serious risks linked to unauthorized access to personal and financial data, which can lead to identity theft, financial fraud, and operational disruptions. In addition to the breaches listed below, numerous other incidents have been reported on underground forums, impacting both large and small organizations across various sectors in the United States.
TIDE NATO Data Leak:
On July 7, 2024, a threat actor known as "natohub" posted on an underground forum, claiming to have obtained a significant data leak from TIDE (Think-Tank for Information Decision and Execution Superiority), a NATO-affiliated organization. The leak reportedly includes 643 CSV files containing sensitive information such as user data, user groups, physical and virtual servers, and event logs. A large portion of the data pertains to users from the United States.
Virginia Department of Elections Database Leaked on Underground Forum:
A reputed threat actor known as IntelBroker has leaked a database belonging to the Virginia Department of Elections. The database contains sensitive information such as voter names, addresses, and party affiliations.
Healthcare.gov Database posted on Underground Forum:
A threat actor known as HealthDontCare was seen posting a healthcare.gov database. The actor claims to have exploited several vulnerabilities to gain access to the data and is offering the database for free as the threat actor wasn’t paid an extortion fee. The database includes Personally Identifiable Information (PII) of users, such as names, addresses, phone numbers, and email addresses.
Classified Federal Bureau of Investigation (FBI) data posted on a forum:
A reputed threat actor known as komi posted on the underground forum, claiming to have hacked the Federal Bureau of Investigation (FBI) and obtained sensitive user data.
Leaked Data of National Security Agency:
On July 8, 2024, A threat actor known as Gostingr posted on an underground forum, claiming to possess 1.4 GB of sensitive data belonging to the National Security Agency (NSA) of the United States. The data includes full names, email addresses, office numbers, personal cell numbers, and classified information. Gostingr claims to have obtained the data by breaching into Acuity Inc., a company that works directly with the US Government and its allies.
Florida Department of State data breach:
A threat actor known as HikkI-Chan has posted on the underground forum, offering to sell a massive database allegedly belonging to the Florida Department of State (FDOS). The database is claimed to contain over 17 million unique email addresses and Personally Identifiable Information (PII) of approximately 5 million individuals. The data includes full names, IDs, addresses, phone numbers, and more. Additionally, the database reportedly contains information on 83,211 organizations associated with the FDOS, including legal names, DBA names, phone numbers, work titles, work emails, cities, and other details.
ADT Internal Documents Leaked on an Underground Forum:
On July 8, 2024, a threat actor known as Abu_Al_Sahrif leaked internal documents belonging to ADT, an American security company, on an underground forum. The leaked data includes over 2400 files related to ADT technical support and its clients. The same threat actor claimed to possess a collection of internal documents belonging to Leidos, a US-based information technology company. The dates of both the leaks range from 2020 to 2023.
Sale of credit cards from USA:
A user named Staffyyyy on the dark web forum posted about selling credit cards of USA citizens obtained through sniffing. The data includes highly sensitive details such as CardNumber, CardExp, CardCvv, CardHolder information (first and last name, address, city, region, zip code, country), CardHolderIP, email, phone number, Social Security Number (SSN), password, and company details. We have observed other threat actors selling similar data across underground forums and marketplaces, often using the stolen credit cards for fraudulent transactions, identity theft, and unauthorized purchases.
Sale of RDP Access to US-based organizations posted on an Underground Forum:
Several threat actors on underground forums have been observed selling RDP (Remote Desktop Protocol) access to various U.S.-based companies across multiple sectors. These actors claim to have compromised local admin accounts or multiple hosts within organizations and typically offer this access in exchange for payment.
Top Initial Attack Vectors (IAVs) Exploited by Threat Actors:
In recent months, threat actors have been observed exploiting various vulnerabilities and misconfigurations to gain unauthorized access to systems. Below are some of the most common initial attack vectors:
China's Espionage Campaign "Salt Typhoon" Targeting U.S. ISPs:
Salt Typhoon, possibly a Chinese government-backed APT group distinct from APT41, is suspected of engaging in espionage campaigns targeting U.S. ISPs, using sophisticated tactics similar to other Chinese state-sponsored cyber activities.
The motivation behind China's Salt Typhoon campaign involves espionage to access sensitive data on ISP networks, pre-positioning for potential cyber disruptions during conflicts (especially concerning Taiwan), and gathering intelligence on U.S. critical infrastructure and cyber defense vulnerabilities for future exploitation.
The primary focus is U.S.-based ISPs using Versa Networks software, with potential secondary impacts on government agencies, military contractors, and critical infrastructure users of these ISPs. The group exploits zero-day vulnerabilities in ISP network management software, maintains persistent access using backdoors, and moves laterally through compromised systems to high-value targets.
Hacktivist Activities:
Hacktivist groups such as ᴛᴇɴɢᴋᴏʀᴀᴋᴄʏʙᴇʀᴄʀᴇᴡ Official, Anonymous Egypt, CyberArmy of Russia, Alixsec, UserSec, and Dark Storm Team, along with their allies, have been actively targeting the United States. Many of these groups advocate pro-Palestinian and pro-Russian positions and have conducted a range of cyber operations, including DDoS attacks, website defacement, and leaking databases they claim belong to their targets. These hacktivist groups primarily focus on government entities and organizations with ties to Russia and Israel but do not limit their attacks to specific sectors, instead targeting various industries across the board.
Impact on the United States:
- Identity Theft and Financial Fraud: Compromised databases can lead to unauthorized access to sensitive personal information, resulting in identity theft and financial fraud.
- Operational Disruption: Cyber attacks, especially DDoS and ransomware, can disrupt operations of critical infrastructure and services, impacting both businesses and government agencies.
- Data Breaches: Leaked databases and sensitive information can undermine public trust in organizations and government entities, leading to reputational damage.
- National Security Risks: Espionage activities targeting government and defense-related organizations can lead to the theft of sensitive information, jeopardizing national security.
- Increased Cybersecurity Costs: Organizations may face increased costs to enhance their cybersecurity measures in response to growing threats.
Economic Impact: Disruptions caused by cyber incidents can result in significant economic losses for affected organizations and industries.
Recommendations:
- Enhanced Security Protocols: Implement robust security measures, such as multi-factor authentication and encryption, to protect sensitive data.
- Regular Security Audits: Conduct frequent audits and vulnerability assessments to identify and address security weaknesses in systems and networks.
- Employee Training: Provide cybersecurity awareness training to employees to recognize phishing attempts and other social engineering attacks.
- Incident Response Plans: Develop and regularly update incident response plans to ensure quick and effective responses to potential breaches or attacks.
- Collaboration with Cybersecurity Agencies: Engage with federal and local cybersecurity agencies, like CISA, for guidance on threat intelligence and best practices.
- Monitoring and Threat Detection: Utilize advanced monitoring tools to detect unusual activities in networks and respond promptly to potential threats.
- Public Awareness Campaigns: Educate the public on the risks of cyber threats and promote safe online practices to mitigate the impact of identity theft and fraud.
Indicators of Compromise (IoCs)
References