ransomhub attacks u s agencies

The notorious ransomware gang RansomHub has released a sophisticated attack campaign targeting U.S. government agencies, leveraging the FakeUpdates malware framework to devastating effect. The operation, tracked as Water Scylla by researchers, represents a disturbing evolution in ransomware tactics. Since their emergence in February 2024 (formerly known as Cyclops and Knight), they’ve racked up an impressive—or terrifying, depending on your perspective—210 victims across critical sectors.

Sophisticated ransomware outfit RansomHub evolves tactics, targets government, leaving hundreds of victims in its destructive wake.

These aren’t amateur hackers. RansomHub has recruited high-profile affiliates from disbanded groups like LockBit and ALPHV. Their collaboration with FakeUpdates, which uses the SocGholish payload for initial access, has supercharged their capabilities. The attack chain is brutally effective. Legitimate websites get infected with malicious scripts. Unsuspecting visitors see fake browser update notifications. Click. Download. Game over.

The technical details aren’t pretty. RansomHub employs multiple initial access techniques: vulnerability exploitation, phishing emails, password spraying. Once inside, they create user accounts, use Mimikatz for credential theft, and move laterally through networks via RDP and other tools. The group frequently exploits known vulnerabilities in Citrix and other systems to gain initial access. Their encryption uses the Curve 25519 algorithm with intermittent encryption for speed. Clever. Evil, but clever. RansomHub’s distinctive ransom notes provide victims with a unique Tor URL for communication rather than stating initial demands.

Government targets have included the City of Tarrant, Sault Ste. Marie Tribe of Chippewa Indians, and Laramie County Library System. The average ransom demand? A cool $2.79 million. Pay up or your data goes public on their leak site. Nearly 1.6 million records have been affected in 2024 alone. According to industry reports, comprehensive risk assessments could have identified the vulnerabilities these agencies faced before they were exploited.

What’s driving this surge? Simple economics. The ransomware business is booming, and RansomHub offers lucrative splits to affiliates. Their double extortion model—steal data, then encrypt systems—maximizes pressure on victims.

For government agencies, the message is clear: patch systems, enforce strong passwords and MFA, train employees, and maintain offline backups. Because RansomHub isn’t just another cybercrime group. They’re the new big players in a very dangerous game.

You May Also Like

Spearwing Raas Group Escalates Cyber Warfare With Medusa Ransomware Surge

Russian hackers expand their criminal empire while competitors falter. Spearwing’s Medusa ransomware quietly doubled attacks in 2025, demanding up to $15 million from victims. Your organization could be next.

Freshly Unleashed VanHelsing Ransomware Sets Its Sights on Windows and ESXi Systems

New menace VanHelsing ransomware demands $500K, evades detection with “Silent Mode,” and encrypts with ruthless efficiency. Government agencies and corporations are already falling victim. Their $10K/hour toll is just the beginning.

Elite Bronx Private School Faces Major Crisis After Ransomware Breach Exposes Student Data

Elite Bronx school’s 42GB student data nightmare: RansomHub exposed medical records and contact info of $57,000-a-year students on the dark web. Most schools are dangerously unprepared.

Ransomware Crisis Escalates: February 2025 Sees Unprecedented 126% Surge in Attacks!

Ransomware apocalypse strikes: 126% surge in attacks bankrupts 60% of victims within months. AI-powered criminals now hijack webcams to spy on networks while demanding record-breaking $5.2 million ransoms. Your business could be next.