Two Iranian Men charges for Deploying SamSam Ransomware on Hospitals & Public Sectors that Caused $30 M in Losses

Two Iranian Men charges for Sophisticated SamSam Ransomware deployment on various public sectors, Hospitals, Municipalities that caused $30 million damages and huge amount of sensitive data lose.

Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah Mansouri, 27 who residing in Iran were involved the deployment of the SamSam ransomware for almost 34-months.

SamSam Ransomware is one of the most sphosticated Ransomware family that encrypting data on the computers of victims once they infected and lock down the computer and demand the ransom payment in order to provide access back to victims.

Savandi and Mansouri involved to infiltrate the victims computer using the system vulnerabilities and deploy the ransomware and encrypt the complete system files.

There are  more than 200 victims were affected by this ransomware attack included hospitals, municipalities, and public institutions, according to the indictment, including the City of Atlanta, Georgia; the City of Newark, New Jersey; the Port of San Diego, California; the Colorado Department of Transportation; the University of Calgary in Calgary, Alberta, Canada; and six health care-related entities etc.

Once they compromised the Victims then they demaind the ransom amount that needs to pay via bitcoin to exchange for decryption keys for the encrypted data and they exchange the bitcoins into Iranian rial using Iran-based Bitcoin exchangers.

Also they have collected over $6 million USD to date and the attack caused $30 million for the victims.

According to the indictment, the hackers infiltrated computer systems in 10 states and Canada and then demanded payment. The criminal activity harmed state agencies, city governments, hospitals, and countless innocent victims.”

“According to Department of Justice, Savandi and Mansouri are charged with one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two substantive counts of intentional damage to a protected computer and two substantive counts of transmitting a demand in relation to damaging a protected computer.”

Also the These two attackers using Tor to hide their identity duringy launching attacks outside regular business hours, when a victim would find it more difficult to mitigate the attack, and by encrypting backups of the victims’ computers. Officials said.

Victims are encouraged to contact their local FBI field office and file a complaint online with the Internet Crime Complaint Center (IC3).

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

2 days ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

4 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago