1 min read

MS Teams Chaos Leads to Chaos Ransomware

MS Teams Chaos Leads to Chaos Ransomware

For immediate assistance with a network intrusion, ransomware
attack, or BEC, please contact: IrongateResponse@irongatesecurity.com  


The adversaries deploying chaos ransomware have recently gained initial access to corporate networks by spoofing Microsoft Teams calls. The threat group has been observed to call potential victims via MS Teams from a spoofed email and once connected, the adversary represents they are from the helpdesk. The adversary’s intention is to socially engineer the victim to screen share via Teams and allow control enabling the adversary to download and install malware on the victim’s computer. Once the malware is installed, the adversary disconnects, only to return through their malware and deploy ransomware to the corporate network. 

 

  • The user (victim) receives an unsolicited call appearing to be from corporate IT helpdesk. 
  • The caller (adversary) tricks the user into allowing a screen share and enabling control by stating they need to install some updates, and it will only take a few minutes. 
  • The caller (adversary) downloads malware to the user’s (victim) system to install a potential backdoor. 
  • Once installation is successful, the caller (adversary) disconnects. 
  • Moments later, the adversary returns through the backdoor to deploy ransomware. 

 

Notable Observations:

  • The time from the initial call to deployment of ransomware has been observed to be short, only a few hours. 
  • Average ransom demand for Chaos is $3,750,000, average payment is $807,500, average negotiated discount is approximately 78%. 
  • Victim organizations have been observed to have hundreds of employees to several thousand across multiple industries including Insurance, Engineering, and Real Estate

 

Mitigation Recommendations: 

  • Educate your organization to verify the identity of unsolicited callers as well as your organizations procedures for how IT will initiate contact to the employees. 
  • Review and scrutinize the callers email address to identify mistyped email domains. 
  • Ask the caller to “go on camera” and have them perform a series of actions to attempt to identify the use of deepfake technology. 
  • Disconnect from the call with the unsolicited caller and call IT directly from a trusted phone number or contact method. 
  • IT can disable communications from external sources (this wouldn’t affect the use of Teams conference calls).
    


Contact us today to learn more about our Digital Forensics and Incident Response (DFIR) services.

Ramey

Steve Ramey has spent the past two decades helping clients protect, investigate, and respond to events involving their digital interests.
He has led hundreds of data breach investigations, assessed incident response and security programs, and successfully advised organizations through extortion negotiations.

 

Charting Your Path in Cybersecurity by Uncovering Your Core Focus & Interests

3 min read

Charting Your Path in Cybersecurity by Uncovering Your Core Focus & Interests

Thinking about a career in cybersecurity? Use this practical guide to identify which path to take

Read More
Navigating the Cybersecurity Maze: Carving Your Path in a Multifaceted Domain

3 min read

Navigating the Cybersecurity Maze: Carving Your Path in a Multifaceted Domain

In the vast and ever-changing cybersecurity landscape, there is a place for every kind of talent. By focusing on your chosen track, you'll not only...

Read More
How to Embed Defense in Your Cloud and DevOps Management

1 min read

How to Embed Defense in Your Cloud and DevOps Management

October 24, 2023 IronGate CEO Steve Ramey a Featured Speaker at The QA Financial E-commerce Forum in New York

Read More