Share This:

Threat Update

A large increase of activity has been seen from malicious threat actors. Many different vectors have been combined to facilitate targeted and widespread attacks. Considering the technical difficulty of these methods, these attackers are highly sophisticated, and organizations should be especially vigilant about the attack surface of their company. SKOUT recommends having proper patching and password policies, as well as keeping users trained to be wary of malicious emails.

Technical Detail & Additional Information


Sophisticated attack methods have seen a large increase of spear-phishing, ransomware, and exploitation of public facing applications. Groups have been seen impersonating financial institutions to compromise credentials and deploy RATs (remote access trojans) by email. Other groups have been seen exploiting public applications to gain access to internal networks, then deploying wipers disguised as ransomware. Essentially – they are encrypting and wiping victims’ data while asking for a ransom for data that is not recoverable.


This is especially noteworthy due to the various methods being combined to facilitate these attacks. Groups have purchased various domains to impersonate financial institutions and perform spear-phishing campaigns. Once a user downloads a malicious .exe from an email, threat actors can gain access to the internal network, compromising any confidential data, and performing attacks as they see fit. Other advanced actors have been seen utilizing VPNs, and then tunneling traffic through an organization’s RDP to deploy ransomware.


Organizations must be extremely cautious when considering their attack surface. Threat actors will steal confidential data, credentials, and even perform wiper attacks disguised as ransomware. Extremely advanced threat actors may try to stay persistent on the internal network to gather as much information as they can, and then perform an attack if they deem it necessary.


Considering the different attacks being deployed, organizations should perform the following:

  • Have an endpoint protection solution in place that can detect and block these attacks. SKOUT recommends our Endpoint Protection, which can block malicious files from executing on both memory and disk.
  • Train users vigilantly to be wary of emails that may ask for credentials, or ask the user to download a file to process information (such as a loan or other type of sensitive data.)
  • Block the IP addresses, domains, and hash values located in the following link so that attacks are intercepted by your email protection system, or so that infected systems cannot communicate with these IOCs:
  • Ensure no vulnerable or important services or equipment is open to the public to ensure that attackers cannot exploit them.
  • Deploy strong password policies and patching policies to increase the security level of your organization.


For more in-depth information about the recommendations, please visit the following links:

If you have any questions, please contact our Security Operations Center.

Share This:
Doris Au

Posted by Doris Au

Doris is a product marketing manager at Barracuda MSP. In this position, she is responsible for connecting managed service providers with multi-layered security and data protection products that can protect their customers from today’s advanced cyber threats.

Leave a reply

Your email address will not be published. Required fields are marked *