Stratos Ally

Hybrid Cloud Users at Risk of Ransomware Attacks: A New Threat Unveiled  

Picture of StratosAlly

StratosAlly

Hybrid Cloud Users at Risk of Ransomware Attacks: A New Threat Unveiled 

A dangerous new wave of ransomware attacks is sweeping across the digital landscape, and hybrid cloud users are in the crosshairs. Microsoft’s security experts have sounded the alarm on a cunning ransomware strain unleashed by a group known as Storm-0501. Active since 2021, this group has been targeting critical sectors like government, law enforcement, and manufacturing, leaving a trail of chaos in its wake.  

Storm-0501 is not just after data; it is after power. This cybercriminal gang is wreaking havoc and demanding hefty ransoms from its victims by exploiting weak points in both on-premise and cloud systems.  

What makes this attack more alarming is the ransomware variant called “Embargo,” written in the Rust programming language. This strain is not only hard to detect but also uses sophisticated encryption methods under a Ransomware-as-a-Service (RaaS) model. Essentially, Storm-0501 pays for the ransomware’s development while reaping financial rewards from targeted victims.  

Let us understand how the attack happens. Storm-0501 first breaks into weakly protected accounts on local devices. From there, they make their way into the cloud systems and make sure they can stay inside unnoticed. Once in control, they use the Embargo ransomware to carry out a “double-extortion” attack: they steal important files and then lock the rest. The victims are then told to pay a ransom, or else their stolen data will be leaked online.  

Imagine a company that uses both local servers (on-premise) and cloud storage to manage sensitive data, like financial records. If an employee’s credentials are not adequately protected, cybercriminals can gain access. Once inside, they steal confidential data and lock the rest of the files. The company is thereafter extorted to either remit the ransom or face the publication of its confidential information online.  

The lesson? Organizations need to enforce strong identity and access management (IAM) protocols to protect against attacks like these. Microsoft advises that businesses should regularly audit privileged accounts and tighten cloud security to stay ahead of Storm-0501. 

more Related articles