FBI Alerts Law Firms to Threat from Silent Ransom Group

Published:

spot_img

The FBI recently issued a warning about a troubling new tactic being employed by a cybercriminal group called the Silent Ransom Group (SRG), also known by aliases such as Luna Moth and Chatty Spider. This group has been leveraging IT-themed social engineering techniques to execute callback phishing attacks, enabling them to gain unauthorized access to systems and steal sensitive information.

Historically, SRG has cast a wide net, targeting various sectors, including healthcare and insurance. However, since spring 2023, the group seems to have honed in on U.S.-based law firms and similar organizations. According to the FBI, this shift is likely due to the extremely sensitive nature of legal data which these firms handle.

The SRG has been active since 2022 and is particularly notorious for its use of callback phishing emails—often referred to as reverse vishing. In these schemes, they impersonate well-known companies, claiming that the victim has signed up for a subscription service. If the victim wishes to cancel this fictitious subscription, they are instructed to call a provided number. During this call, the attacker sends a link for the victim to download remote access software, allowing them to infiltrate the victim’s device. Once access is established, the attackers search for sensitive data, later threatening to release that information unless a ransom is paid.

In March 2025, the group adapted its tactics, incorporating direct phone calls. Posing as IT department employees, they engage in social engineering—also known as vishing, short for “voice phishing.” During these calls, SRG attempts to convince employees to grant remote access under the pretense of urgent software maintenance. If successful, the attackers can quickly move from basic access to more extensive data exfiltration, typically utilizing tools like WinSCP or a modified version of Rclone.

Challenges in Detection

The effectiveness of SRG’s vishing methods cannot be overstated. The FBI has noted a significant number of compromises resulting from these attacks. One of the alarming aspects is that the group often puts pressure on victim organizations to engage in ransom negotiations. While they maintain a site to publish stolen data, their inconsistent usage makes it difficult to track the extent of their activities.

Signs of Compromise

Due to the employment of legitimate management and access tools, SRG attacks can evade detection by traditional antivirus software. Organizations are encouraged to be vigilant and look out for several warning signs, including:

  • Unauthorized downloads of remote access tools such as Zoho Assist, AnyDesk, or Splashtop.
  • Connections made through WinSCP or Rclone to unknown external IP addresses.
  • Communications indicating that data has been compromised, whether through emails or voicemails.
  • Unexpected phone calls from unidentified individuals claiming to represent the IT department.
  • Emails regarding subscription services that require a phone call to resolve purported charges.

Prevention Strategies

To combat these types of threats effectively, organizations should implement several protective measures:

  • Conduct comprehensive staff training focused on recognizing and responding to phishing attempts.
  • Establish clear authentication policies for confirming IT staff identities with employees.
  • Implement two-factor authentication for all users to add an additional layer of security.

The FBI is actively seeking information from those who have been affected by SRG attacks. Victims are encouraged to report any ransom notes, phone numbers, or other communications related to these attacks, including cryptocurrency wallet information used for ransom payments. These actions can help in building a comprehensive understanding of SRG’s methods and enhancing protective measures.

spot_img

Related articles

Recent articles

Qld Law Firm Launches Investigation into SafePay Ransomware Breach

Queensland Law Firm Targeted in Cyber Attack: Investigation Underway Overview of the Incident A cyber attack has reportedly hit Ruddy Tomlins and Baxter (RTB Legal), a...

Start Your Migration to Post-Quantum Cryptography Today!

Migration Toward Post-Quantum Cryptography: A Call to Action As advancements in quantum computing progress, the urgency for organizations to shift to post-quantum cryptographic standards is...

Iranian Hacker Admits Guilt in $19 Million Robbinhood Ransomware Attack on Baltimore

Ransomware Scheme: Iranian National Pleads Guilty in U.S. Court May 28, 2025Ravie LakshmananRansomware / Data Breach An Iranian individual has admitted guilt in a U.S. court,...

Building Blocks of Leadership: The Intelligent CISO’s Skills

Building Resilient Security Teams: Insights for CISOs In today’s fast-paced digital landscape, the role of Chief Information Security Officers (CISOs) has evolved dramatically. With the...