A new Sophos report on the anatomy of simultaneous ransomware attacks against a healthcare provider organization spotlights vulnerability management considerations and variances into attack methods used by different threat groups.The analysis centers on two ransomware incidents launched against a Canadian provider in December 2021 by Karma and Conti. Both ransomware groups exploited a known, unpatched vulnerability in the Microsoft Exchange platform with ProxyShell exploits. Karma was first to hack into the system, gaining access in mid-August and leveraging ProxyShell to download attack scripts from remote servers. The threat actor reconnected with a compromised admin account over a remote desktop protocol to install additional malicious payloads.The group’s “actual efforts to more deeply penetrate the network began in earnest weeks later.” The provider’s system logs showed more than 20 failed attempts to connect to other servers on the network, finally establishing a successful connection to the admin account on another web application server.The access enabled the exfiltration of data “pushing 52GB of archived files up to the cloud,” before leaving a ransom note on the impacted machines. The group opted not to encrypt the data, given its healthcare status.Conti leveraged the same ProxyShell exploits against several Microsoft Exchange vulnerabilities. The hack gave Conti access to the same server on Nov. 25, during the same period where Karma was reconnecting with the compromised admin account. Conti used the access to collect data via RDP to the impacted server to search folders to identify valuable files.The data harvesting was followed by the installation of a “Chrome browser and WinRar utility on the main file server to exfiltrate archives to the Mega cloud using an RDP session.” Unlike Karma, Conti had no qualms with encrypting the data and deployed its ransomware after stealing the data. The attack was launched the day after Karma left its ransom demand.Conti’s attack “took place even as Karma was dropping ransom notes on additional systems,” according to the report. “Meanwhile, the targeted organization’s network defenses detected and blocked Cobalt Strike activity coming from one of the organization’s mail servers (not the one serving as point of entry).”
Ransomware, Patch/Configuration Management, Vulnerability Management
Ransomware anatomy: Dual cyberattacks on provider call for vulnerability review

An ambulance parked outside the Accident & Emergency department at a London hospital is seen on Sept. 26, 2007. A new Sophos report shines a light on ransomware attack anatomy, based on simultaneous attacks on a healthcare provider by Karma and Conti threat groups. (Photo by Cate Gillon/Getty Images)
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds



