Cybersecurity experts in Oceania are warning that the INC ransomware operation is causing a lot of trouble for healthcare organizations in the area This article explores oceania warning ransomware. . Ransomware actors have always targeted healthcare, especially 24/7 patient care facilities, ever since they all agreed that being moral wasn't their strong suit.
INC is a good example of this trend because it goes after the industry more than almost any other ransomware group. It has spread those operations around the world in the last few years. The Australian Cyber Security Centre (ACSC), the Kingdom of Tonga's National Computer Emergency Response Team (CERT Tonga), and New Zealand's National Cyber Security Centre (NCSC) all put out a warning about it together on March 6.
They might not see how many attacks bigger economies have to deal with, but even one successful breach can have a big effect, and their ability to respond to incidents might be less." Related: The Indian APT "Sloppy Lemming" is going after defense and critical infrastructure. Authorities have now found the person who hacked Tonga: Roman Khubov, who goes by the name "blackod" online.
They also released a picture of his face. Besides what is briefly said in the advisory, not much is known about Khubov in public. ## Standard Ways to Fix Things Can Defeat Old TTPs Oceania cyber authorities recommended that organizations interested in defending against the INC ransomware group take appropriately basic cybersecurity precautions, like monitoring and restricting network traffic and remote access, implementing multifactor authentication (MFA) where applicable, and diligently managing software vulnerabilities.
Christopher Hills, chief security strategist at BeyondTrust, says, "INC is not using new or cutting-edge tactics to compromise this industry; instead, they are using what I call legacy tactics to compromise organizations." "These criminals are getting into the environments with valid credentials.












