NetWalker (aka Mailto) ransomware, developed and operated by a cybercrime group known as Circus Spider, has been active since mid-2019. Since the past few months, its operators are actively targeting victims, mostly in corporate networks.
Actor's top targets
Lately, the NetWalker operators targeted several enterprises running systems on Windows OS.
This group’s activity increased during the coronavirus pandemic, which was directed at the healthcare sector.
Besides healthcare, the ransomware had been used to target various firms in manufacturing (Canadian Tire), business management solutions (Barbizon Capital), customer experience management (Stellar), electromobility and battery solutions (Forsee Power), education (University of California), and many more.
Modus operandi
The group behind this ransomware operates in a ransomware-as-a-service model and can quickly adapt according to recent situations (as they evidently took advantage of the coronavirus pandemic.)
The cybercrime group behind this ransomware identified as Circus Spider, a financially motivated threat group. At the end of May, the ransomware group was reportedly inviting other criminals to become a partner in spreading the ransomware. They were giving preference to those who had cybercrime experience and access to corporate networks.
Key takeaways
Netwalker ransomware is using a double attack strategy, first encryption of data and then blackmailing victims to leak it publically. Experts suggest the most efficient way to avoid this threat is to stop the ransomware at the initial stage with adequate security measures, such as using secure email gateways, endpoint protection, and providing training to employees.