Sarcoma is a destructive ransomware group first detected in early 2024, known for its aggressive triple extortion tactics and deliberate data destruction if demands are not met.
Named after the aggressive nature of sarcoma cancers, this ransomware mirrors that reputation by threatening not just to leak stolen data but to permanently destroy backups and critical files, leaving victims with few recovery options.
A break-in at your offices would compel you to call the police immediately and touch nothing until they arrive, understanding the need for a forensic investigation.
A cyber-attack requires the same action. Your first responsibility would be to call in the forensic experts and ensure the environment remains untouched.
This is not a job for your IT team or MSP. There are Digital Forensic specialists available 24/7 who can assist you.
Sarcoma Ransomware has emerged as one of the most active and dangerous ransomware groups in recent months. First detected in October 2024, it rapidly escalated from a new threat to a major concern for the cybersecurity community.
Known for its aggressive operations and growing number of successful attacks across various sectors and regions, Sarcoma leverages advanced techniques such as zero-day exploits and remote monitoring and management (RMM) tools for network discovery and credential theft.
The group targets high-value industries where downtime is especially costly - such as healthcare, legal services, and education - and has disrupted major companies like Unimicron and TMA Group. Victims’ data is encrypted with a .sarcoma extension, and ransom notes are direct and threatening, demanding cryptocurrency payments under tight deadlines.
In some cases, Sarcoma increases pressure by threatening additional DDoS attacks to force quicker payments.
Sarcoma utilise double extortion. This is a ransomware tactic where attackers both encrypt and steal a victim’s data, then threaten to leak it if the ransom isn’t paid. This method pressures victims to pay even if they have backups, due to risks like reputational harm or legal consequences.
Sarcoma first appeared in early 2024 and is still a relatively new threat actor. It has been linked to 115 successful incidents so far, with most victims being mid-sized to large organisations that handle valuable personal or medical data.
Its aggressive tactics and reputation for following through on threats make Sarcoma a particularly dangerous strain to encounter.
Solace Cyber’s track record includes hundreds of successful response recoveries, providing Digital Forensic Incident Response services, 24x7x365.
“The NCSC handled 430 significant cyber incidents in 2024, a 16% increase from the previous year.”
Solace Global was founded in 2010 as global experts in risk management and security, offering services such as Travel, Crisis, and Offshore Risk Management. With a 24/7 Security Operations Centre and an in-house intelligence team providing daily and weekly reports, Solace Global is accredited to ISO 27001, 14001, 45001, and 9001 standards.
Solace Cyber was established in 2021, specialising in Cyber breaches, particularly Digital Forensics and Incident Response, Ransomware, Risk Management, and Information Security, along with Managed Security Services. The leadership team collectively possess over 20 years of experience in the IT and security industry.
Solace Cyber is accredited to ISO 27001 and, in 2022, achieved recognition as an Assured Service Provider for Cyber Incident Response (CIR) at the Standard Level with the National Cyber Security Centre. This prestigious accreditation reflects the UK's highest cyber security standards, ensuring top-tier incident response support and recovery.
s
%+
A forensic analysis needs to be meticulous and a clean restore and recovery requires a wealth of experience not normally available in an in-house team who must provide a broader range of IT support skills:
Solace Cyber was established precisely for this scenario. We have a well-defined process for handling cyber-attacks like Sarcoma, which involves a 6-step approach:
Triage
Analysis
Contain and Mitigate
Remediate and Eradicate
Recover
Post-Incident Examination
It includes a thorough digital forensic analysis from step 2 where the output becomes a central component of business recovery. This is because understanding the attack is of critical importance:
Informing an initial infection date
The extent and spread of infection
Data exfiltration having an impact on regulatory positions
Ensuring that the attacker and any tooling or artefacts they leave behind are eradicated
It is critical that the analysis of digital evidence is carried out to an agreed plan. This will have been designed to provide the best and earliest chance of discovering a root cause, which is essential to inform remediation/eradication and recovery as well as supporting a legal take-down case if this is applicable. A legal take-down means we can assist in the legal enforcement that stops the criminals from publishing the data, thus undermining the ransom notice.
Solace’s Digital Forensic and Incident Response teams maintain consistent communication throughout. Dedicated Incident Managers and technical engineering leads provide updates during the Cyber Incident Response journey, utilising risk registers and working within change management processes, all from triage through to post-incident, delivering successful business recovery.
Solace Cybers' assistance extends beyond recovery. After restoring your business operations, we work collaboratively to ensure your cyber security posture is robust using a threat-informed methodology. This involves leveraging our comprehensive 9-step framework known as the Solace Global - Cyber 9 Step Process.
Yes, Sarcoma is a ransomware operation that encrypts files, steals sensitive data, and threatens permanent data destruction and DDoS attacks to force payment.
A Sarcoma ransomware attack generally enters a system in one of the following ways:
To protect your organisation:
The average cost of ransomware breaches hover around £500K, while smaller email data breaches typically incur expenses of around £50K. A critical decision emerges between preserving the environment for forensic analysis or opting for swift recovery to minimise business disruption. Delays in identifying and resolving breaches only exacerbate costs.
Cybersecurity insurance claims entail a multifaceted process, encompassing reasonable expenditures for investigation and remediation, alongside coverage for legal, business interruption, criminal liability, employment liability, and ransom policies. While the insurance industry plays a pivotal role in facilitating business recovery, cyber insurance is perceived as volatile within the sector, and many policies require meticulous validation.
Facing genuine pressure, there's a crucial decision to make - one that could rescue your organisation from weeks of operational standstill, reputation damage, and client data loss. Yet, the probability of a favourable outcome remains slim, emphasising the importance of engaging a specialised ransomware incident response team. They are your most viable recourse for navigating a ransomware incident.
The NCSC have documented the deliberations for paying ransomware: https://www.ncsc.gov.uk/ransomware/home
Important Reminder: It is a criminal offense to pay money to people who are subject to financial sanctions. The list of who is subject to financial sanctions is constantly changing.
The latest iteration can be found here: https://www.gov.uk/government/publications/financial-sanctions-consolidated-list-of-targets
Yes. There's a possibility that some of the lost data contains "Personal Data" belonging to your customers. Safeguarding such data is a legal requirement, so it's important to consider notifying the Information Commissioner's Office (ICO) about this incident, as well as your customers. https://ico.org.uk/
Your insurer or legal counsel will provide guidance on the necessary steps and how to proceed in this matter. However, Solace Cyber has experience collaborating with insurers and legal representatives and can offer assistance in managing these relationships during this challenging period.
Your business operations may experience significant disruptions. These could include:
To mitigate these effects, it's crucial to have a comprehensive incident response plan in place, including communication strategies, collaboration with cybersecurity experts, and measures to enhance system resilience and data protection. Additionally, transparency with stakeholders and proactive steps to rebuild trust can help minimize the long-term consequences on your business.
The NCSC is the UK National Cyber Security Centre. They provide cyber security guidance and support, helping to make the UK the safest place to live and work online. They have defined a Cyber Incident Response procedure and they have approved and accredited suppliers to provide this service.
As a recognised Assured Service Provider by the National Cyber Security Centre (NCSC), Solace Cyber provide comprehensive cyber risk management services that are designed to Protect, Detect & Mitigate cyber security threats across the UK.
Action Fraud is the UK's national reporting centre for fraud and cybercrime. Whether you have been scammed, defrauded, or experienced cybercrime in England, Wales, or Northern Ireland, Action Fraud offers a central point of contact for information on fraud and financially motivated cybercrime.
If your systems are showing signs of an Sarcoma attack, REMAIN CALM.
YOU MUST NOT TOUCH THEM, RESTORE OR OVERWRITE THE DATA (explanation above).
Contact Solace Cyber on 01202 308818 or complete our form for a call back from one of our experts.
We will act promptly to reduce your business downtime.
Solace Cyber, part of Solace Global, helps companies across the UK recover from ransomware attacks and data breaches.
SOLACE GLOBAL CYBER LTD is registered in England & Wales no. 08830710
Solace Global
Twin Sails House,
W Quay Rd,
Poole, BH15 1JF
United Kingdom