Ransomware, Critical Infrastructure Security

Attacks with new Mimic ransomware variant target healthcare

Healthcare entities have been subjected to intrusions involving the novel Mimic ransomware variant dubbed "ELENOR-corp" that features advanced data theft and anti-analysis capabilities, according to Infosecurity Magazine.

Aside from securing command-line access to facilitate credential-less remote command execution and disconnecting virtual drives, the highly obfuscated ELENOR-corp also features persistent registry entries and allows parallel RDP sessions for accelerated compromise across various networks, a report from Morphisec revealed. ELENOR-corp also leverages Python-compiled clipper malware to pilfer credentials before using Netscan and Mimikatz for RDP-based lateral movement, as well as Edge browsers for data exfiltration, said researchers. Malicious activity is then concealed by ELENOR-corp by erasing not only logs, file indexing histories, and registry entries but also the Windows backup catalog and Recycle Bin, indicating significant complications in data restoration efforts. Organizations have been urged to mitigate ELENOR-corp ransomware's threat by adding multi-factor authentication to RDP configurations, ensuring offline backups, and tracking forensic tampering.
OSZAR »

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds

OSZAR »