Inc.Ransom Ransomware

Experiencing Ransomware or Cyber Breach?

Response time is everything when you're under attack. If you've been breached or have an urgent matter, contact us immediately.
Inc.Ransom rose to prominence in July 2023 with very little know about the origins of the group. In it’s first 6 weeks the group leaked data of more than a dozen victims.

You'll recognise an Inc.Ransom infection when a note appears, indicating that your systems are now inaccessible, and your data is encrypted. The specialist threat actors will demand payment, typically in cryptocurrency for discreet transactions. If you fail to pay, they will threaten to either delete or leak your data.

Why you must not interfere with your ransomware environment

A break-in at your offices would compel you to call the police immediately and touch nothing until they arrive, understanding the need for forensic work to take place.

A cyber-attack requires the same action. Your first responsibility would be to call in the forensic experts and ensure the environment remains untouched.

This is not a job for your IT team or MSP. There are digital forensic specialists available 24/7 who can assist you.

Inc.Ransom ScreenA PC Monitor
You’ll know if your system has been compromised by an Inc.Ransom attack if you find a note like the above on your system.
YOU MUST NOT ATTEMPT TO TOUCH, RESTORE OR OVERWRITE THE DATA

Who is Inc.Ransom? What does it do?

A newly emerged ransomware group, Inc.Ransom, came to prominence in July 2023 and began targeting industries including healthcare, education, government agencies and charities, showing little discrimination. Geographically, the group showed a preference for targeting organisations in the USA and Europe, however, the origin of the group itself is currently unknown. Although far reaching, Inc.Ransom is not an opportunistic attacker. The group appears to meticulously choose its targets by focusing on organisations with substantial financial resources and sensitive data, thereby increasing the potential payoff from their ransom demands.

Inc.Ransom utilises multi-extortion tactics, stealing victim data and threatening to leak it online if the victim doesn't comply with their demands. They offer to safeguard the victim's reputation as an incentive to pay the ransom. Spear-phishing emails have been noted as a method for initial access, along with targeting known vulnerabilities such as CVE-2023-3519 in Citrix NetScaler. After gaining initial access, threat actors use a range of Commercial off-the-Shelf (COTS) or Living Off the Land Binaries (LOLBINs) for internal reconnaissance and lateral movement.

UK Data 2024

How Does Inc.Ransom Attack?

The group employs a multi-extortion model, incorporating a TOR-based victim blog site into their operations. Using methods like Spear-phishing and targeting known vulnerabilities, they exfiltrate data before encrypting it, thereby increasing pressure on victims to comply with their ransom demands.

This dual threat significantly heightens the pressure on victims, even if backups are available, due to the serious risks posed by potential data exposure, including reputational damage and legal consequences. This tactic has become increasingly popular among cybercriminals because it maximises their chances of receiving payment.

How old is Inc.Ransom and how many attacks have there been?

Emerging in mid-2023, Inc.Ransom has quickly become one of the most active ransomware groups to date.

Despite its short existence, it has already compromised and ransomed 211 organisations across the western hemisphere.

Most Recent Inc.Ransom Attacks
TitleAvailableLast visitfqdnScreenshots
Yes2025-01-21 16:15:48.511777http://incbacg6bfwtrlzwdbqc55gsfl763s3twdtwhp27dzuik6s6rwdcityd.onion/api/v1/blog/get/announcements?page=1&perPage=15
DisclosuresYes2025-01-21 16:14:46.827913http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures
Error Response PageNo2024-07-08 17:27:20.991513http://incapt.su/blog/leaks

Solace Cyber’s track record includes hundreds of successful response recoveries, providing Digital Forensic Incident Response services, 24x7x365.

"Thirty-seven percent of UK companies have reported a data breach incident to the Information Commissioner's Office (ICO) in the past 12 months."

Read more...

Post Breach Actions

Your NCSC-approved supplier is a specialist Crime Scene Investigator who helps you get back to full operation faster. They will:
  • Isolate and preserve your environment for forensic investigation.
  • Identify where the data has been duplicated and issue a legal takedown order.
  • Identify your data, application and systems restore points. These might be at different points in time and will need to be carefully restored and reconstructed in a pristine environment.
  • Liase with your business insurance company and if needed, with the Police.
  • Advise you on notifying your customers of your situation.
  • Rebuild your systems, restore your data and get you back to full operation.
Note: This process can take between 2 weeks – 2 months.

Ransom Groups Stats by Industry

Critical infrastructure ransomware attacks 2021 bar chartCIR Assured Service Provider Logo

Who is Solace Cyber and what experience do they have in recovering from Inc.Ransom ransomware attacks?

Solace Global was founded in 2010 as global experts in risk management and security, offering services such as Travel, Crisis, and Offshore Risk Management. With a 24/7 Security Operations Centre and an in-house intelligence team providing daily and weekly reports, Solace Global is accredited to ISO 27001, 14001, 45001, and 9001 standards.

Solace Cyber was established in 2021, specialising in Cyber breaches, particularly Digital Forensics and Incident Response, Ransomware, Risk Management, and Information Security, along with Managed Security Services. The leadership team collectively possess over 20 years of experience in the IT and security industry.

Solace Cyber is accredited to ISO 27001 and in 2022 gained the prestigious Cyber Incident Response (Level 2) accreditation with the National Cyber Security Centre in 2022. This accreditation represents the UK’s highest cyber security standards, providing top-tier incident response support and recovery.

Solace Cyber Stats

s

Successful breach recoveries

Users recovered in largest ransomware case
We have NEVER paid a ransom
Designed automation tools to reduce costs

%+

Incident Response
delivered via our Insurance
Partners

Experiencing Ransomware or Cyber Breach?

Response time is everything when you're under attack. If you've been breached or have an urgent matter, contact us immediately.

Why should I trust Solace Cyber to do this work rather than my IT team?

A forensic analysis needs to be meticulous and a clean restore and recovery requires a wealth of experience not normally available in an in-house team who must provide a broader range of IT support skills:

  • Internal IT teams don’t have the necessary skill set to resolve security encryption issues themselves.
  • Internal teams are pressured to restore business operations and may recover before forensic analysis even begins, potentially destroying the crime scene before completion.
  • IT teams may recover to the same position with indicators of compromise ready to do it again…. which can lead to another breach.
  • In 2022, there were not enough adequately qualified people in the job market to meet the CSIRT* resource requirements.
  • Cybercrime has stepped up again in 2024.
IT Support for a Business
Happy customer service worker

Solace Cyber was established precisely for this scenario. We have a well-defined process for handling cyber-attacks like Inc.Ransom, which involves a 6-step approach:

  1. Triage
  2. Analysis
  3. Contain and Mitigate
  4. Remediate and Eradicate
  5. Recover
  6. Post-Incident Examination

It includes a thorough digital forensic analysis from step 2 where the output becomes a central component of business recovery. This is because understanding the attack is of critical importance:

  • Informing an initial infection date
  • The extent and spread of infection
  • Data exfiltration having an impact on regulatory positions
  • Ensuring that the attacker and any tooling or artefacts they leave behind are eradicated

It is critical that the analysis of digital evidence is carried out to an agreed plan. This will have been designed to provide the best and earliest chance of discovering a root cause, which is essential to inform remediation/eradication and recovery as well as supporting a legal take-down case if this is applicable. A legal take-down means we can assist in the legal enforcement that stops the criminals from publishing the data, thus undermining the ransom notice.

Solace’s Digital Forensic and Incident Response teams maintain consistent communication throughout. Dedicated Incident Managers and technical engineering leads provide updates during the Cyber Incident Response journey, utilising risk registers and working within change management processes, all from triage through to post-incident, delivering successful business recovery.

Key Take Aways

  • System Access: You will be unable to access your systems or data.
  • Immediate Actions: Disconnect from the internet and shut down your systems, including PCs, to prevent further infections.
  • Email and Communication Security: Your Office 365 system might be compromised, allowing attackers to monitor your responses. Avoid using your primary email or team communication systems.
  • Pre-Attack Infiltration: Threat actors typically infiltrate your system 2-4 weeks before you become aware of the attack. Your data will have already been exfiltrated by this time.
  • Ransom Costs: Ransom demands can range from £0.5m to £3m.
  • Legal Risks: Paying the ransom may violate financial sanctions, constituting a criminal offense that could result in imprisonment or additional financial penalties.
  • Data Exposure: Data sold or published on the web puts your customers and staff at risk and implicates you in a data protection breach.
  • Data Takedown: You will need to request a takedown of the data from its initial location.
  • Data Handling: Do not overwrite the encrypted data. It is crucial to determine when the infection began and where the data was exfiltrated.
  • Back-Up Restoration: Avoid rebuilding from the latest backup, as it may also be infected.
How do I maintain security in future to prevent a further ransomware attack?

Solace Cybers' assistance extends beyond recovery. After restoring your business operations, we work collaboratively to ensure your cybersecurity posture is robust using a threat-informed methodology. This involves leveraging our comprehensive 9-step framework known as the Solace Global - Cyber 9 Step Process.

Frequently asked questions

Yes, Inc.Ransom deploys its own distinct type of ransomware. The operators position themselves as providing a service to their victims, who can pay the ransom to "protect their reputation."

An Inc.Ransom ransomware attack generally enters a system in one of the following ways:

  • Phishing / Spear Phishing Emails
  • Exploiting Vulnerabilities
  • Purchased credentials
  • Not maintaining software updates

We recommend you adopt policies to:

  1. Educate your staff on the importance of cyber security and the risks of not complying
  2. Use strong passwords
  3. Multi-factor authentication
  4. Remove old users
  5. Perform regular backups
  6. Deploy timely updates to software and systems

After recovering from Inc.Ransom Solace Cyber recommends that you update your business continuity plan to account for lessons learnt during this attack & recovery.

The average cost of ransomware breaches hover around £500K, while smaller email data breaches typically incur expenses of around £50K. A critical decision emerges between preserving the environment for forensic analysis or opting for swift recovery to minimise business disruption. Delays in identifying and resolving breaches only exacerbate costs.

Cybersecurity insurance claims entail a multifaceted process, encompassing reasonable expenditures for investigation and remediation, alongside coverage for legal, business interruption, criminal liability, employment liability, and ransom policies. While the insurance industry plays a pivotal role in facilitating business recovery, cyber insurance is perceived as volatile within the sector, and many policies require meticulous validation.

Navigating the nuances requires experience, which is where Solace Cyber comes in.

Facing genuine pressure, there's a crucial decision to make - one that could rescue your organisation from weeks of operational standstill, reputation damage, and client data loss. Yet, the probability of a favourable outcome remains slim, emphasising the importance of engaging a specialised ransomware incident response team. They are your most viable recourse for navigating a ransomware incident.

The NCSC have documented the deliberations for paying ransomware: https://www.ncsc.gov.uk/ransomware/home

Important Reminder: It is a criminal offense to pay money to people who are subject to financial sanctions. The list of who is subject to financial sanctions is constantly changing.

The latest iteration can be found here: https://www.gov.uk/government/publications/financial-sanctions-consolidated-list-of-targets

Yes. There's a possibility that some of the lost data contains "Personal Data" belonging to your customers. Safeguarding such data is a legal requirement, so it's important to consider notifying the Information Commissioner's Office (ICO) about this incident, as well as your customers. https://ico.org.uk/

Your insurer or legal counsel will provide guidance on the necessary steps and how to proceed in this matter. However, Solace Cyber has experience collaborating with insurers and legal representatives and can offer assistance in managing these relationships during this challenging period.

Your business operations may experience significant disruptions. These could include:

  • Downtime: Your systems may be unavailable or operating at reduced capacity for a prolonged period, affecting productivity and revenue generation.
  • Reputational Damage: Public awareness of the breach can erode trust and confidence in your brand, leading to potential customer loss and difficulty acquiring new clients.
  • Financial Losses: Beyond immediate costs like remediation and recovery, there may be long-term financial repercussions due to decreased sales, legal fees, and regulatory fines.
  • Legal and Regulatory Challenges: Compliance obligations and legal proceedings stemming from the breach may consume time and resources, further impeding business operations.
  • Employee Morale and Productivity: Team morale can suffer due to uncertainty and increased workloads, impacting overall productivity and retention rates.

To mitigate these effects, it's crucial to have a comprehensive incident response plan in place, including communication strategies, collaboration with cybersecurity experts, and measures to enhance system resilience and data protection. Additionally, transparency with stakeholders and proactive steps to rebuild trust can help minimize the long-term consequences on your business.

The NCSC is the UK National Cyber Security Centre. They provide cyber security guidance and support, helping to make the UK the safest place to live and work online. They have defined a Cyber Incident Response procedure and they have approved and accredited suppliers to provide this service.

https://www.ncsc.gov.uk/

As a recognised Assured Service Provider by the National Cyber Security Centre (NCSC), Solace Cyber provide comprehensive cyber risk management services that are designed to Protect, Detect & Mitigate cyber security threats across the UK.

Action Fraud is the UK's national reporting centre for fraud and cybercrime. Whether you have been scammed, defrauded, or experienced cybercrime in England, Wales, or Northern Ireland, Action Fraud offers a central point of contact for information on fraud and financially motivated cybercrime.

https://www.actionfraud.police.uk/

Contact Us

Under Attack?

If your systems are showing signs of an Inc.Ransom attack, REMAIN CALM.

YOU MUST NOT TOUCH THEM, RESTORE OR OVERWRITE THE DATA (explanation above).

Contact Solace Cyber on 01202 308818 or complete our form for a call back from one of our experts.

We will act promptly to reduce your business downtime.

Request a callback

Solace Cyber, part of Solace Global, helps companies across the UK recover from ransomware attacks and data breaches.

Risk
Offshore
Cyber
Intelligence & Reports
Case Studies

SOLACE GLOBAL CYBER LTD is registered in England & Wales no. 08830710

Solace Global

Twin Sails House,
W Quay Rd,
Poole, BH15 1JF
United Kingdom

Telephone

Please note that calls may be recorded for security and training purposes.