IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

FBI: Ragnar Locker ransomware breached 52 US critical infrastructure orgs

The news comes as three big cyber security vendors join hands to offer critical infrastructure organisations free security products and support

The Federal Bureau of Investigation (FBI) said on Monday that at least 52 critical infrastructure entities have been breached by the Ragnar Locker ransomware group as of January 2022.

In a FLASH advisory that includes details on the indicators of compromise (IOCs) for such breaches, the FBI said the 52 affected organisations were situated across ten different sectors including energy, financial services, government, and IT.

Details of the specific entities have not been revealed, or the extent to which the ransomware gang was able to extort the affected organisations. However, one high-profile target of the group was Capcom, the attack on which affected nearly half a million individuals.

The group has been known to the FBI since April 2020 and in that time Ragnar Locker has influenced the techniques of other ransomware gangs such as Maze and joined a so-called ‘ransomware cartel’ with LockBit, Conti, SunCrypt, and Maze.

The threat to critical infrastructure organisations, especially from ransomware, has been greater in the past few years. High profile attacks on the likes of Colonial Pipeline have proved to threat actors that these types of organisations cannot afford downtime, meaning they’re more likely to pay a ransom demand, despite industry advice admonishing the practice. 

The FBI even made the rare admission in Monday’s FLASH advisory that it understands critical infrastructure organisations may feel they need to pay the ransom given the operational importance of their services. Though it did reiterate that payment should never be made.

In light of the heightened risk presented by ransomware, as well as the recent conflict in Ukraine, critical infrastructure organisations can benefit from a new, free cyber security service delivered by Cloudflare, CrowdStrike, and Ping Identity, as the trio announced the initiative also on Monday.

The cyber security companies announced the launch of the Critical Infrastructure Defense Project which will provide free security services to critical infrastructure organisations as the risk of cyber attacks against them is thought to have increased since war broke out in eastern Europe. The free services will last for four months, Cloudflare told IT Pro, though beneficiaries will be notified well ahead of the end date. 

Vulnerable organisations can request free access to Cloudflare’s full suite of zero trust security products, CrowdStrike’s endpoint protection and intelligence services, and Ping Identity’s zero trust identity products, in addition to a step-by-step guide on how to defend against cyber attacks. 

Related Resource

Modernise your server infrastructure for speed and security

Infrastructure lifecycle automation paves the way for an adaptive, resilient organisation

Whitepaper cover with title and block dark green rectangle with grey and white arrow graphicsFree Download

"We rely on our infrastructure to power our homes, to provide access to water and basic necessities, and to maintain critical access to healthcare," said Matthew Prince, co-founder and CEO at Cloudflare. "That’s why it’s more important than ever for the security industry to band together and ensure that our most critical industries are protected and prepared."

"We are honoured to come together with CrowdStrike and Ping Identity during this time of heightened security risk to protect our nation’s most vulnerable infrastructure."

The FBI and the US’ Cybersecurity and Infrastructure Security Agency (CISA) said in February that organisations should be on high alert for cyber attacks following the official invasion of Ukraine by Russia

Organisations were encouraged to patch against 95 common security vulnerabilities known to be used often by Russian-linked threat actors and report all incidents to CISA for the purposes of intelligence gathering.

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT
ransomware

Darktrace AI’s Antigena helps stop ransomware attack at Dordogne GHT

13 Apr 2022
Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

18 Nov 2021
US and Israel join forces to fight ransomware
ransomware

US and Israel join forces to fight ransomware

15 Nov 2021

Most Popular

Europe's first autonomous petrol station opens in Lisbon
automation

Europe's first autonomous petrol station opens in Lisbon

23 May 2022
Nvidia pauses hiring to help cope with inflation
Careers & training

Nvidia pauses hiring to help cope with inflation

23 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022