BleepingComputer reports that attacks with the INC ransomware payload have been deployed by the Vanilla Tempest threat operation, also known as Vice Society and DEV-0832, against healthcare organizations across the U.S. Vanilla Tempest, which was previously associated with the Rhysida ransomware group, leveraged initial network access secured from Storm-0494's Gootloader malware attacks to distribute Supper malware and AnyDesk remote monitoring and MEGA data synchronization tools before proceeding with lateral movement and the eventual execution of INC ransomware, according to the Microsoft Threat Intelligence team. Additional details regarding the organization affected by the intrusion were not provided but Michigan-based non-profit healthcare system McLaren Health Care was reported to have had its operations disrupted by an INC ransomware attack last month. Such a development comes months after the INC Ransom ransomware-as-a-service operation had its Windows and Linux/VMware ESXi encryptor source codes purportedly sold by threat actor "salfetka" on hacking forums.
Ransomware, Critical Infrastructure Security
US healthcare sector subjected to attacks with INC ransomware

Credit: Adobe Stock Images
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds