Wednesday, April 24, 2024

Two Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public Sectors that Caused $30 M in Losses

Two Iranian Men charges for Sophisticated SamSam Ransomware deployment on various public sectors, Hospitals, Municipalities that caused $30 million damages and huge amount of sensitive data lose.

Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah Mansouri, 27 who residing in Iran were involved the deployment of the SamSam ransomware for almost 34-months.

SamSam Ransomware is one of the most sphosticated Ransomware family that encrypting data on the computers of victims once they infected and lock down the computer and demand the ransom payment in order to provide access back to victims.

Savandi and Mansouri involved to infiltrate the victims computer using the system vulnerabilities and deploy the ransomware and encrypt the complete system files.

There are  more than 200 victims were affected by this ransomware attack included hospitals, municipalities, and public institutions, according to the indictment, including the City of Atlanta, Georgia; the City of Newark, New Jersey; the Port of San Diego, California; the Colorado Department of Transportation; the University of Calgary in Calgary, Alberta, Canada; and six health care-related entities etc.

Once they compromised the Victims then they demaind the ransom amount that needs to pay via bitcoin to exchange for decryption keys for the encrypted data and they exchange the bitcoins into Iranian rial using Iran-based Bitcoin exchangers.

Also they have collected over $6 million USD to date and the attack caused $30 million for the victims.

According to the indictment, the hackers infiltrated computer systems in 10 states and Canada and then demanded payment. The criminal activity harmed state agencies, city governments, hospitals, and countless innocent victims.”

“According to Department of Justice, Savandi and Mansouri are charged with one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two substantive counts of intentional damage to a protected computer and two substantive counts of transmitting a demand in relation to damaging a protected computer.”

Also the These two attackers using Tor to hide their identity duringy launching attacks outside regular business hours, when a victim would find it more difficult to mitigate the attack, and by encrypting backups of the victims’ computers. Officials said.

Victims are encouraged to contact their local FBI field office and file a complaint online with the Internet Crime Complaint Center (IC3).

Website

Latest articles

Researchers Uncover that UK.GOV Websites Sending Data to Chinese Ad Vendor Analysts

Analysts from Silent Push, a data analytics firm, have uncovered several UK government websites...

Ransomware Victims Who Opt To Pay Ransom Hits Record Low

Law enforcement operations disrupted BlackCat and LockBit RaaS operations, including sanctions on LockBit members...

IBM Nearing Talks to Acquire Cloud-software Provider HashiCorp

IBM is reportedly close to finalizing negotiations to acquire HashiCorp, a prominent cloud infrastructure...

Rewards Up to $10 Million for Information on Iranian Hackers

The United States Justice Department has announced big rewards for information leading to the...

PoC Exploit Released For Critical Oracle VirtualBox Vulnerability

Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege...

Tracing the Steps of Cyber Intruders: The Path of Lateral Movement

When cyber attacks strike, it's rarely a single computer that suffers. Nowadays, cybercriminals set...

U.S. to Impose Visa Restrictions on 13 Individuals Involved in Commercial Spyware Operations

To combat the misuse of commercial spyware, the United States Department of State has...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles