Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Cloak Ransomware Group Strikes Again: Virginia Attorney General's Office Hacked


The Cloak ransomware group has struck again, targeting the Virginia Attorney General's Office in a sophisticated cyberattack that forced officials to shut down IT systems and revert to paper filings. The attack is believed to be part of a larger trend of ransomware attacks targeting government agencies and private sector organizations.

  • The Cloak ransomware group has targeted the Virginia Attorney General's Office in a sophisticated cyberattack.
  • The attack is believed to be part of a larger trend of ransomware attacks targeting government agencies and private sector organizations.
  • The Cloak ransomware group has breached over one hundred organizations across various sectors since at least 2023.
  • The group uses an ARCrypter ransomware variant, derived from Babuk's leaked code, to encrypt files after infiltrating a network.
  • The attack highlights the growing threat of ransomware attacks and the need for organizations to prioritize cybersecurity.



  • The Cloak ransomware group has struck again, this time targeting the Virginia Attorney General's Office in a sophisticated cyberattack. The attack, which occurred in February, forced officials to shut down IT systems, including email and VPN, and revert to paper filings. Chief Deputy AG Steven Popps described the attack as "sophisticated" and attributed it to a "ransomware group claiming responsibility for the attack."

    The Cloak ransomware group has been active since at least 2023 and has breached over one hundred organizations across various sectors, including healthcare, real estate, construction, IT, food, and manufacturing. The group's attack strategy involves acquiring network access through Initial Access Brokers (IABs) or social engineering methods such as phishing, malvertising, exploit kits, and drive-by downloads disguised as legitimate updates like Microsoft Windows installers.

    According to a report published by Halcyon, Cloak primarily targets small to medium-sized businesses in Europe, with Germany being a key focus. The group has extended its operations to countries in Asia and targets various sectors, including healthcare, real estate, construction, IT, food, and manufacturing. Cloak's attack strategy involves acquiring network access through Initial Access Brokers (IABs) or social engineering methods such as phishing, malvertising, exploit kits, and drive-by downloads disguised as legitimate updates like Microsoft Windows installers.

    The group uses an ARCrypter ransomware variant, derived from Babuk's leaked code, to encrypt files after infiltrating a network. The Cloak ransomware group has been linked to several high-profile breaches in the past, including the 2023 breach of the UK's National Health Service (NHS) and the 2022 breach of the German software company, Siemens.

    The attack on the Virginia Attorney General's Office is not an isolated incident, but rather part of a larger trend of ransomware attacks targeting government agencies and private sector organizations. In recent years, ransomware attacks have become increasingly common, with attackers using various tactics to gain access to networks and steal sensitive data.

    In addition to the attack on the Virginia Attorney General's Office, several other organizations have been targeted by the Cloak ransomware group in recent months. These include companies in Europe, Asia, and North America, across various sectors. The attacks are believed to be part of a larger campaign by the group to expand its operations and target new jurisdictions.

    The Cloak ransomware group's attack on the Virginia Attorney General's Office highlights the growing threat of ransomware attacks and the need for organizations to prioritize cybersecurity and implement robust security measures to protect themselves against these types of threats. The attack also underscores the importance of incident response planning and preparation, as well as the need for government agencies to invest in cybersecurity measures to protect sensitive data.

    In conclusion, the Cloak ransomware group's attack on the Virginia Attorney General's Office is a reminder of the ongoing threat posed by ransomware attacks and the need for organizations to prioritize cybersecurity. The attack highlights the importance of incident response planning and preparation, as well as the need for government agencies to invest in cybersecurity measures to protect sensitive data.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Cloak-Ransomware-Group-Strikes-Again-Virginia-Attorney-Generals-Office-Hacked-ehn.shtml

  • https://securityaffairs.com/175751/data-breach/cloak-group-hacked-virginia-attorney-generals-office.html

  • https://undercodenews.com/babuk-lockers-dangerous-evolution-a-global-cybersecurity-crisis/

  • https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/


  • Published: Mon Mar 24 04:14:56 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us