Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Breaches

Ransomware Group Claims Attack on Virginia Attorney General’s Office

The Cloak ransomware group has claimed responsibility for a February cyberattack on Virginia Attorney General’s Office.

A ransomware group known as Cloak has claimed responsibility for a disrupting cyberattack on the Virginia Attorney General Office’s systems.

The incident became public in mid-February, when the state’s top prosecutorial agency told employees that nearly all its computer systems, internal services and applications, and website were down, and that internet connectivity and VPN access were affected as well.

Employees were notified of the attack via email and were reportedly directed to return to paper court filings, but the AGO refrained from publicly sharing details on the intrusion.

On March 20, however, the Cloak ransomware gang added the Virginia AGO to its Tor-based leak site, making data allegedly stolen from its systems available for download, which suggests that the group failed to extort the AGO.

SecurityWeek has emailed the Attorney General’s Office for a statement on the incident and will update this article if a response arrives.

Active since late 2022, Cloak appears to have made over 65 victims to date, but only 13 of its attacks have been confirmed, cybersecurity firm Comparitech notes. The attack on Virginia AGO is its first confirmed attack this year.

For encryption, the ransomware gang relies on an ARCrypter variant derived from leaked Babuk ransomware code, Halcyon says.

Believed to be linked to the Good Day ransomware group, Cloak uses social engineering for initial access, but also collaborates with initial access brokers, and has been observed mainly targeting small- and medium-sized businesses in Europe and Asia.

Advertisement. Scroll to continue reading.

Related: Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover

Related: LockBit Ransomware Developer Extradited to US

Related: Recent Fortinet Vulnerabilities Exploited in ‘SuperBlack’ Ransomware Attacks

Related: FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.