Thursday, January 30, 2025
HomeCyber CrimeTwo Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public...

Two Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public Sectors that Caused $30 M in Losses

Published on

SIEM as a Service

Follow Us on Google News

Two Iranian Men charges for Sophisticated SamSam Ransomware deployment on various public sectors, Hospitals, Municipalities that caused $30 million damages and huge amount of sensitive data lose.

Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah Mansouri, 27 who residing in Iran were involved the deployment of the SamSam ransomware for almost 34-months.

SamSam Ransomware is one of the most sphosticated Ransomware family that encrypting data on the computers of victims once they infected and lock down the computer and demand the ransom payment in order to provide access back to victims.

Savandi and Mansouri involved to infiltrate the victims computer using the system vulnerabilities and deploy the ransomware and encrypt the complete system files.

There are  more than 200 victims were affected by this ransomware attack included hospitals, municipalities, and public institutions, according to the indictment, including the City of Atlanta, Georgia; the City of Newark, New Jersey; the Port of San Diego, California; the Colorado Department of Transportation; the University of Calgary in Calgary, Alberta, Canada; and six health care-related entities etc.

Once they compromised the Victims then they demaind the ransom amount that needs to pay via bitcoin to exchange for decryption keys for the encrypted data and they exchange the bitcoins into Iranian rial using Iran-based Bitcoin exchangers.

Also they have collected over $6 million USD to date and the attack caused $30 million for the victims.

According to the indictment, the hackers infiltrated computer systems in 10 states and Canada and then demanded payment. The criminal activity harmed state agencies, city governments, hospitals, and countless innocent victims.”

“According to Department of Justice, Savandi and Mansouri are charged with one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two substantive counts of intentional damage to a protected computer and two substantive counts of transmitting a demand in relation to damaging a protected computer.”

Also the These two attackers using Tor to hide their identity duringy launching attacks outside regular business hours, when a victim would find it more difficult to mitigate the attack, and by encrypting backups of the victims’ computers. Officials said.

Victims are encouraged to contact their local FBI field office and file a complaint online with the Internet Crime Complaint Center (IC3).

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...