INC RANSOM hackers announced another target recently. The organization went for the Lutheran Social Services of Indiana, which they apparently managed to breach on the 10th of April. The leak post was updated yesterday, suggesting the situation is still ongoing.
Naturally, this is just a cover-up, as INC RANSOM qualifies as a ransomware threat with typical MOs and tactics. The gang simply poses as a service provider to ease the victims’ minds, so that they can come to terms with paying the ransom.
Several other ransomware groups use this tactic, although it doesn’t necessarily guarantee payment. As data shows, only 29% of the ransomware victims paid the ransom in Q4 of 2023. This is a significant drop from the previous years.
By comparison, in 2019, more than 85% of ransomware victims were paying the ransom, followed by a visible drop to 46% in 2021. Despite this downward trend, many still pay the ransom, which is enough to keep the hackers in business.
But is that enough for INC RANSOM? Yes and no. The fact that companies and governmental institutions have become more knowledgeable and wary about ransomware attacks isn’t optimal.
The fact that they no longer comply to the ransom demands at the same rates isn’t great either. So, ransomware actors had to adapt, INC RANSOM included. How? Several tactics are worth mentioning here.
INC RANSOM operates slightly differently than your typical uneducated ransomware gang. In a paradigm where most victims refuse to pay the ransom or even negotiate, the novel ransomware actor has adopted several noticeable tactics to circumvent that:
These tactics not only make it more difficult for the victim to resist the hackers but also make it trickier to overcome the problem. INC RANSOM’s encryption is very powerful and versatile, and many victims are forced to pay the ransom to recover their system.
Currently, INC RANSOM has upgraded to a double-extortion practice, forcing the victim to bargain for both the decryption key and the deletion of the data. This often increases the value of the ransom to be paid.
If you think you’re a potential target for INC RANSOM or any other ransomware gang, you might want to act today. Boost your defenses, educate your employees about avoiding traps, and contract the services of legitimate experts for a plus of security.
We believe security online security matters and its our mission to make it a safer place.