Summary of Findings
- A major fuel pipeline in the United States shuts down after a ransomware attack.
- CaptureRX, a healthcare administrative company based in the United States, suffers a ransomware attack.
- Microsoft investigates a business email compromise (BEC) campaign that targeted organizations using a gift card scam.
- Pirated software downloaded by a university student opens the door to a Ryuk ransomware attack on a life sciences research institute.
Ransomware Attack Shuts Down Colonial Pipeline, Causing Fuel Shortages
A ransomware attack disrupted the largest refined gasoline and jet fuel pipelines in the United States . The Colonial Pipeline was shut down as a precautionary measure after it was discovered that the company operating the pipeline’s corporate network was compromised. Part of the nation’s critical infrastructure, the Colonial Pipeline extends approximately 8850 kilometers (5,500 miles)  and carries 45 percent of the U.S. East Coast’s fuel supplies.
The U.S. Federal Bureau of investigation (FBI) identified the ransomware used as DarkSide . This new ransomware-as-a-service (RaaS) platform is advertised on the Russian-language forums exploit.in and xss.is .
Various incidents of fuel shortages have been reported after the incident  . The operator of the pipeline stated that it had initiated an operational restart but supply restoration would take several days . Colonial Pipeline reportedly paid a $5 million ransom to the threat actors .
CaptureRx Suffers Ransomware Attack Leading to Theft of Patient Data
Texas-based CaptureRx, an administrative services provider to healthcare organizations such as hospitals and health centers, suffered a ransomware attack that led the theft of confidential information for thousands of patients . The data acquired by the threat actors included names, dates of birth, prescription information and, for a limited number of patients, medical record numbers.
The incident occurred in February 2021, and CaptureRx assessed the scope of the information theft throughout February and March. The company started notifying the affected healthcare providers at the end of March.
It is not currently known which ransomware variant was used in the attack, but historically the Ryuk ransomware has been deployed  to target the healthcare sector.
Business Email Compromise Campaign Is Complex, According to Microsoft
Microsoft published research  detailing a business email compromise (BEC) campaign that used attacker-created email infrastructure to facilitate gift card theft. The threat actors used typo-squatted domains to make the emails appear as if they were originating from valid senders. Tailored email messages coaxed the target into buying gift cards for a supposed legitimate business reason, such as a reward for a team member. The gift card codes were sent by the unsuspecting target to the attacker, who could cash out the funds or resell the codes.
As Microsoft noted, this seemingly simple attack was actually quite complicated, involving reconnaissance and targeting, social engineering, and delivery infrastructure. In this instance, the threat actors registered over 120 typo-squatted domains to impersonate actual businesses. They targeted organizations in the consumer goods, process manufacturing and agriculture, real estate, and professional services sectors.
“Cracked” Software Creates Opening for Ransomware Attack on Research Institute
A European biomolecular research institute with university partnerships was the victim of a Ryuk ransomware attack . The institute, which is involved with COVID-19-related research, lost a week’s worth of vital data because it failed to back up its most recent work.
It was determined that a student who was allowed to access the institute's network without two-factor authentication inadvertently downloaded a trojan to his personal computer. The trojan was embedded in a “cracked” version of a data visualization software tool that the student installed. The trojan was used to create a remote desktop protocol (RDP) account on the institute's network. This account was then used to launch the ransomware attack.