Apura Cyber Corp’s Post

The US Treasury Department has sanctioned the Chinese company Sichuan Silence and its employee Guan Tianfeng for participating in the Ragnarok ransomware attacks in April 2020, which targeted US critical infrastructure companies and other global organizations. Sichuan Silence, based in Chengdu, is a government contractor that offers network exploitation, password cracking, email monitoring and public demonstration suppression services, often collaborating with Chinese intelligence services. The attacks exploited a zero-day vulnerability discovered by Guan in Sophos XG firewalls *(CVE-2020-12271)*, allowing the compromise of approximately 81,000 devices worldwide, including 23,000 in the US. Among the targets in the US were 36 devices protecting critical infrastructure, including an energy company whose drilling operations could have caused significant human losses had the attack not been thwarted. The actions included data theft, such as user credentials, and attempts to infect systems with the Ragnarok ransomware. After the attacks were identified and mitigated by Sophos with a patch and removal of malicious scripts, the hackers activated a “dead man switch”, unleashing ransomware attacks against Windows machines connected to the victims' networks. Would you like to have access to this type of content firsthand and in greater depth? Contact us now and start a Proof of Value with our solution.

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics