As predicted, it only took a few days into the new year for a new ransomware group to emerge. First identified by MalwareHunterTeam, Night Sky ransomware has already published the information of two victims. BleepingComputer reportedly observed a sample of the Night Sky ransomware and said it is customized to contain a personalized ransom note and hardcoded login credentials to access the victim’s negotiation page. Instead of using a Tor site to communicate with victims, Night Sky uses email addresses and a clear web website running Rocket.Chat. Much like other ransomware groups, Night Sky uses the double-extortion technique, threatening to leak stolen data if a ransom is not paid.
Ransomware attacks are expected to continue in 2022 and new groups will continue to emerge. Organizations should initiate proactive measures to ensure they are protected from ransomware including:
• Regularly back up data, air gap, and password protect backup copies offline.
• Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.
• Implement network segmentation.
• Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud).
• Install updates/patch operating systems, software, and firmware as soon as practical after they are released. Implement monitoring of security events on employee workstations and servers, with a 24/7 Security Operations Center to detect threats and respond quickly.
• Use multifactor authentication where possible.
• Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes.
• Avoid reusing passwords for multiple accounts.
• Focus on cyber security awareness and training.
• Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.