ransomhub attacks u s agencies

The notorious ransomware gang RansomHub has released a sophisticated attack campaign targeting U.S. government agencies, leveraging the FakeUpdates malware framework to devastating effect. The operation, tracked as Water Scylla by researchers, represents a disturbing evolution in ransomware tactics. Since their emergence in February 2024 (formerly known as Cyclops and Knight), they’ve racked up an impressive—or terrifying, depending on your perspective—210 victims across critical sectors.

Sophisticated ransomware outfit RansomHub evolves tactics, targets government, leaving hundreds of victims in its destructive wake.

These aren’t amateur hackers. RansomHub has recruited high-profile affiliates from disbanded groups like LockBit and ALPHV. Their collaboration with FakeUpdates, which uses the SocGholish payload for initial access, has supercharged their capabilities. The attack chain is brutally effective. Legitimate websites get infected with malicious scripts. Unsuspecting visitors see fake browser update notifications. Click. Download. Game over.

The technical details aren’t pretty. RansomHub employs multiple initial access techniques: vulnerability exploitation, phishing emails, password spraying. Once inside, they create user accounts, use Mimikatz for credential theft, and move laterally through networks via RDP and other tools. The group frequently exploits known vulnerabilities in Citrix and other systems to gain initial access. Their encryption uses the Curve 25519 algorithm with intermittent encryption for speed. Clever. Evil, but clever. RansomHub’s distinctive ransom notes provide victims with a unique Tor URL for communication rather than stating initial demands.

Government targets have included the City of Tarrant, Sault Ste. Marie Tribe of Chippewa Indians, and Laramie County Library System. The average ransom demand? A cool $2.79 million. Pay up or your data goes public on their leak site. Nearly 1.6 million records have been affected in 2024 alone. According to industry reports, comprehensive risk assessments could have identified the vulnerabilities these agencies faced before they were exploited.

What’s driving this surge? Simple economics. The ransomware business is booming, and RansomHub offers lucrative splits to affiliates. Their double extortion model—steal data, then encrypt systems—maximizes pressure on victims.

For government agencies, the message is clear: patch systems, enforce strong passwords and MFA, train employees, and maintain offline backups. Because RansomHub isn’t just another cybercrime group. They’re the new big players in a very dangerous game.

You May Also Like

FTC Drops Controversial Ransomware Investigation Against MGM Resorts Amidst Rising Cybersecurity Concerns

FTC abruptly halts MGM’s $100M ransomware probe amid fierce corporate resistance. The controversial investigation’s sudden end spotlights the murky battlefield between regulators and businesses in cybersecurity oversight. Who really won?

Ransomware Crisis Escalates: February 2025 Sees Unprecedented 126% Surge in Attacks!

Ransomware apocalypse strikes: 126% surge in attacks bankrupts 60% of victims within months. AI-powered criminals now hijack webcams to spy on networks while demanding record-breaking $5.2 million ransoms. Your business could be next.

Unclaimed Mystique: Cyberattack on National Presto Industries Highlights Ransomware Fears

Defense contractor infiltration exposes military data to ransomware attackers while executives downplay the breach. National Presto’s quiet SEC disclosure masks potentially devastating consequences for national security.

North Korea’s Moonstone Sleet Unleashes Qilin Ransomware: Are You Next?

North Korea’s hackers abandon homegrown tools for Qilin ransomware, demanding millions from victims worldwide. Your business could be their next payday. No organization is truly safe.