RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
September 8, 2022

The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

Vice Society ransomware group targets America’s education sector, the U.S. government’s new position on software supply chain security, and more.

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
The Week in Cybersecurity: Vice Society ransomware group targets back-to-school

Welcome to the latest edition of The Week in Cybersecurity, which brings you the newest headlines from both the world and our team about the most pressing topics in cybersecurity. This week: Vice Society ransomware group targets America’s education sector, the U.S. government’s new position on software supply chain security, and more.

This week’s top story

As classrooms reopen for another school year, Vice Society ransomware group targets America’s education sector

This week, the U.S. government has turned its attention to an emerging threat group that has been targeting one of the nation’s critical entities: education. CISA, in conjunction with the FBI and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has released a joint Cybersecurity Advisory warning the public of the Vice Society ransomware group. The advisory includes tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) related to Vice Society, based on the group’s attacks that have occurred as recently as this month.

According to the advisory, Vice Society is described as an “intrusion, exfiltration, and extortion hacking group.” The attackers have been utilizing the same versions of past ransomware types, such as Hello Kitty and Zeppelin Ransomware. The group has also utilized Cobalt Strike, SystemBC and PowerShell Empire to move laterally in victims’ networks. The group so far has taken hold of sensitive information belonging to students and staff at educational institutions using double-extortion techniques, seeking financial profit from their targets.

It’s still unclear why Vice Society has chosen to target the education sector, considered to be a key part of America’s critical infrastructure. There is obvious concern that the country’s education system will remain a target for cybercriminals, especially since many schools have begun their calendar-year this past week. The education sector is already dealing with a worrisome labor shortage, and the last thing it needs is more school closures due to ransomware attacks.

News roundup

Here are the stories we’re paying attention to this week…

U.S. Gov's Securing the Software Supply Chain guidelines: A roadmap for the post-SolarWinds world (develop.secure.software)

The U.S. Federal Government dropped what may be its most significant statement on software supply chain security. Here are four key takeaways from the government’s report which recommends practices for development teams.

Critical RCE vulnerability affects Zyxel NAS devices - firmware patched released (The Hacker News)

Networking equipment maker Zyxel has released patches for a critical security flaw impacting its network-attached storage (NAS) devices. The issue relates to a "format string vulnerability" affecting NAS326, NAS540, and NAS542 models.

QNAP tells NAS users to "take immediate action" after new wave of DeadBolt ransomware attacks (Graham Cluley)

Owners of QNAP NAS drives have been advised to “take immediate action” in the wake of a new wave of DeadBolt ransomware attacks. According to a news release by NAS manufacturer QNAP, the DeadBolt ransomware is exploiting a vulnerability in QNAP’s Photo Station software to encrypt data stored on victim’s drives.

New stealthy Shikitega malware targeting Linux systems and IoT devices (The Hacker News)

A new piece of stealthy Linux malware called Shikitega has been uncovered adopting a multi-stage infection chain to compromise endpoints and IoT devices and deposit additional payloads.

Violence-as-a-Service: brickings, firebombings, and shooting for hire (Krebs on Security)

A 21-year-old New Jersey man has been arrested and charged with stalking in connection with a federal investigation into groups of cybercriminals who are settling scores by hiring people to carry out physical attacks on their rivals.

Montenegro is the victim of a cyberattack (Schneier on Security)

Details are few, but Montenegro has suffered a cyberattack. Russia is being blamed, with the assumption that “they’re the obvious perpetrator,” despite a lack of evidence.

Tags:Modern SOC

More Blog Posts

envelopes with pixelated bugs crawling out of them

How to Stop Phishing Attacks Being Missed

Unveiling the Hidden Threats: Enhancing Email Security with Object-Level Analysis

Learn More about How to Stop Phishing Attacks Being Missed
How to Stop Phishing Attacks Being Missed
laptop screen with green shield checkmark being labelled as malicious

How SOC analysts and threat hunters can expose malware undetected by EDR

Enhancing Endpoint Visibility: Leveraging Advanced File Intelligence to Uncover Evasive Threats

Learn More about How SOC analysts and threat hunters can expose malware undetected by EDR
How SOC analysts and threat hunters can expose malware undetected by EDR
reversinglabs elastic threat infrastructure new updates

ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams

...

Learn More about ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams
ReversingLabs Elastic Threat Infrastructure Update: Integration, Automation for SOC Teams
The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

Fallout from another supply chain attack involving malicious npm modules. Also: Microsoft backtracks on a pledge to disable Office macros.

Learn More about The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros
The Week in Cybersecurity: NPM removes malicious modules, Microsoft backtracks on macros

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top