Ransomware activity increased in February, with threat actors expanding their tactics and continuing to exploit both technical and human vulnerabilities. RansomHub was observed leveraging CVE-2024-55591 to gain administrative access to Fortinet firewalls, while Clop sustained large-scale exploitation campaigns involving secure file transfer tools. MOXFIVE was also engaged with multiple clients that were targeted by a social engineering technique tied to Black Basta, using Microsoft Teams as an initial contact vector — underscoring the growing importance of user awareness as a first line of defense.
Phishing emails, VPN vulnerabilities, lack of MFA, software flaws, drive-by downloads, and social engineering remain the most frequently observed initial access points for ransomware attacks.
Several ransomware groups remained highly active in February, continuing to evolve their tactics and capitalize on newly disclosed vulnerabilities.
Manufacturing remained the most frequently impacted industry in February, followed by Technology and Professional Services. Healthcare and Transportation & Logistics also saw elevated levels of ransomware activity, highlighting continued interest from threat actors in sectors with valuable data and operational urgency.
In February, MOXFIVE continued to observe an effective social engineering technique leveraged by the Black Basta ransomware group to impact environments. Fortunately, most companies with strong endpoint detection and response (EDR) tools had the malicious files blocked; however, this occurred only after users had granted access to a threat actor posing as IT helpdesk.
In this campaign, ransomware access brokers (RABs) impersonated IT helpdesk personnel using names like “Help Desk” or “Support Team.” The attackers leveraged public employee directories, LinkedIn profiles, and stolen credentials to identify targets. In some cases, victims were first signed up for spam email lists — a tactic used to create urgency. Threat actors then followed up with Teams messages or calls offering to help remediate the “issue,” a tactic dubbed Teams vishing.
In known cases where this tactic was successful, the attackers guided users to download remote access tools such as AnyDesk or Quick Assist to gain initial access.
User awareness training remains one of the most effective defenses against social engineering-based attacks. In the recent Teams vishing campaigns, user awareness training has proven to be one way organizations can better protect against social engineering attempts and reduce the risk of initial access.
To strengthen resilience across the organization, consider the following actions:
As threat actors continue to innovate their initial access techniques, an alert and informed user base remains one of the most important components of a strong defense strategy.