Keep your eyes on these

VERY IMPORTANT

Security Articles

RSS

From the Front Lines | Another Rebrand? Mindware and SFile Ransomware Technical Breakdown

released on 2022-06-07 @ 11:21:50 AM
The Mindware gang first became active in March 2022. By April, the group was practicing double extortion and operating its own leaks site. Mindware received further attention in April when it was noted by a different researcher to have attacked a mental health provider. Mindware samples use a distinctive Reflective DLL injection technique. This, along with other indicators described below, show strong overlaps with SFile ransomware samples. Although SentinelOne does not yet have specifics as to how Mindware attacks are initiated, SFile is known to use RDP bruteforce as an entry vector into an organization. Each Mindware payload is configured for a specific target. Upon infection and successful execution, the payload drops a hardcoded ransomware note containing a combination of instructions and threats.