25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Feds Sound Alarm About Ghost Ransomware Group

U.S authorities have issued a warning about the China-based Ghost ransomware group, which has conducted ransomware attacks in around 70 countries on multiple industry sectors including healthcare, education, religious institutions, technology, manufacturing, and government networks.

The group, also known as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture, has been active since at least 2021, and its victims include many small- to medium-sized businesses. According to the joint cybersecurity alert from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), the group conducts attacks indiscriminately, targeting low-hanging fruit – businesses with poorly secured Internet-facing servers.

The group uses publicly available exploits for multiple vulnerabilities, some of which date back to 2009. The group has exploited vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), Adobe ColdFusion servers (CVE2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE2021-34473, CVE-2021-34523, and CVE-2021-31207).

In contrast to many ransomware groups, Ghost actors prioritize speed and do not have a major focus on persistence, often deploying their ransomware payloads the same day that initial access is gained to a victim’s network. More recently, the group has been observed deploying web shells on victims’ web servers, creating new local and domain accounts, and changing passwords for existing accounts.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Cobalt Strike is used to identify system processes and antivirus protections, which are subsequently disabled, including disabling Windows Defender on network-connected devices. Ghost actors use Cobalt Strike functions to steal process tokens running under the SYSTEM user context to impersonate the SYSTEM user and run Beacon a second time with elevated privileges. They have also been observed to use a wide range of open source tools for privilege escalation, several of which would not typically be used by legitimate users, for instance, SharpZeroLogon, BadPotato, and GodPotato. Windows Management Instrumentation Command-Line (WMIC) is often used to run PowerShell commands on additional network systems. When lateral movement is not possible, attacks have simply been abandoned and the group does not tend to spend time attempting to breach hardened systems.

While many ransomware groups spend time identifying and exfiltrating large amounts of sensitive data, data exfiltration is often limited. Threats are issued to publish stolen data, but Ghost actors do not frequently exfiltrate highly sensitive data such as intellectual property or personally identifying information, limiting the harm caused by data leaks. The main aim of attacks is to encrypt data to obtain a ransom payment in exchange for the decryption keys, with ransom demands generally in the range of tens to hundreds of thousands of dollars.

The cybersecurity advisory includes Indicators of Compromise (IoCs) and recommended mitigations, the most important being to improve baseline security by patching known vulnerabilities promptly, training the workforce to recognize phishing attempts, using phishing-resistant multifactor authentication on email and privileged accounts, segmenting networks to prevent lateral movement, and regularly backing up data, ensuring backups are not accessible from source systems.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist