A ransomware gang known as Sabbath is going after critical infrastructure groups in North America. In addition, it sets itself apart by targeting backups.

Backups Singled Out

A rebrand of UNC2190, Sabbath has targeted U.S. and Canadian critical infrastructure. That includes education, natural resources and health sectors.

In October 2021, for instance, the threat group extorted a U.S. school district on social media and demanded a multi-million dollar ransom, according to Mandiant. The group went so far as to contact staff, parents and students for the purpose of putting more pressure on the school district, a technique known as triple extortion.

The Sabbath ransomware group also steals data in bulk and attempts to destroy backups in targeted attacks. These tactics enabled them to extort six victims using a public shaming blog in November. That attack included nearly the same text content — including grammatical errors — as another. Both Sabbath and a web portal and blog launched in June 2021 by Arcane appear to be rebrands of UNC2190.

Other Instances of Bashed Backups

Targeting data backups has become a common technique among ransomware groups in the past few years.

Researchers in 2019 observed malicious actors scanning IP address ranges for publicly exposed NAS devices. They then reviewed those devices, known for hosting backup data. From there, they could uncover firmware vulnerabilities for the purpose of deploying ransomware.

In 2020, a security team got more insight. They witnessed a ransomware group launch their payload during a search into why a client’s backup data was missing. A closer look revealed that the attackers had deleted the clients’ backup information before running their malware payloads, as reported by SC Media.

In 2021 Threatpost noted that the Conti ransomware gang had begun focusing on building up expertise to remove backups. The gang was interested in those who could identify, localize and deactivate data backups.

How to Defend Against Sabbath Ransomware Attacks

The only way to defend against Sabbath attacks is to try to prevent a ransomware attack from occurring in the first place. You can do this in a variety of ways, including:

  • Limiting access to legacy systems
  • Achieving visibility over network assets
  • And using threat intelligence to defend against emerging ransomware attacks.

You can also use best practices to secure their critical infrastructure. Those guidelines include employing access controls, segmenting the information technology (IT) and operational technology (OT) networks as well as applying the zero trust model to all operator control input.

More from Data Protection

Heads Up CEO! Cyber Risk Influences Company Credit Ratings

4 min read - More than ever, cybersecurity strategy is a core part of business strategy. For example, a company’s cyber risk can directly impact its credit rating. Credit rating agencies continuously strive to gain a better understanding of the risks that companies face. Today, those agencies increasingly incorporate cybersecurity into their credit assessments. This allows agencies to evaluate a company’s capacity to repay borrowed funds by factoring in the risk of cyberattacks. Getting Hacked Impacts Credit Scoring As per the Wall Street Journal…

4 min read

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

3 min read - KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you trust. The Transformation of the Data Security Industry As digital transformation continues to expand, the impact it has had on enterprises is very apparent when…

3 min read

SaaS vs. On-Prem Data Security: Which is Right for You?

2 min read - As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards. However, not all data security solutions are created equal. Are you choosing the right solution for your organization? That answer depends on various factors, such as your industry, size and specific security needs. SaaS vs. On-Premises…

2 min read

Understanding the Backdoor Debate in Cybersecurity

3 min read - The debate over whether backdoor encryption should be implemented to aid law enforcement has been contentious for years. On one side of the fence, the proponents of backdoors argue that they could provide valuable intelligence and help law enforcement investigate criminals or prevent terrorist attacks. On the other side, opponents contend they would weaken overall security and create opportunities for malicious actors to exploit. So which side of the argument is correct? As with most debates, the answer isn't so…

3 min read