25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

ELENOR-Corp Ransomware Group Targets Healthcare with New Mimic Ransomware Variant

The healthcare sector is being targeted by a new ransomware group called ELENOR-corp, according to the cybersecurity firm Morphisec. Researchers determined that ELENOR-corp was using a new version of Mimic ransomware (version 7.5), a ransomware strain first identified in 2022.

The new ransomware variant was identified during an incident investigation at a healthcare victim and appears to be linked to a previous Clipper malware infection. Clipper malware is a Python-based clipboard hijacker used for credential theft. The malware is thought to have allowed re-entry to the victim’s environment. The malware took daily snapshots of user activity and was installed along with a cryptocurrency miner. The researchers determined with a high degree of probability that Clipper malware had been deployed by the same threat actors. Initial access was gained around a week before the ransomware payload was deployed.

After gaining access to the healthcare provider’s environment, the group moved laterally and compromised multiple servers via Remote Desktop Protocol (RDP), using tools such as Process Hacker and IOBit Unlocker. The attackers created local accounts on compromised servers and tried propagating using a local administrator account. The group used a variety of tools such as NetScan for network discovery, Mimikatz for credential harvesting, PEView for executable inspection, Mssm.exe to create persistent services, and Edge browsers to upload stolen data to Mega.nz.

Mimic 7.5 has several new functions, such as ensuring command-line access regardless of system restrictions, helping to use the sticky-keys technique that enables remote command execution without user credentials. The ransomware also forcibly unmounts virtual drives to prevent hidden data storage, encrypts remote network shares using Windows APIs, and destroys the Windows recovery environment and system state backups. After file encryption, the ransomware dropped a ransom note on the Desktop and established registry-based persistence, launching Notepad each time the device reboots to display the ransom note. The ransomware also writes the ransom demand into the Windows Legal Notice registry keys to ensure it is displayed at the system login screen.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Morphisec recommends strengthening RDP configurations with multi-factor authentication, monitoring for forensic tampering, and ensuring backups are created of all critical data and are stored securely offline. The report and analysis include Indicators of Compromise (IoCs) for network defenders.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist