Beware: Sneaky Ransomware Tactics Targeting Corporate Remote Access!
Ransomware groups STAC5143 and STAC5777 are tricking companies into granting remote access for data theft. Sophos warns that victims face a spam avalanche, followed by a fake IT call urging remote software installation. To dodge these cyber tricks, keep Teams calls locked, restrict remote apps, and educate employees on email and Teams scams.

Hot Take:
Well, it seems that cybercriminals have taken a page out of a soap opera script—bombarding you with drama and then swooping in as the “savior” IT person. It’s like the tech version of a phishing love triangle. Just remember, the only romance you should be having with your computer is with your antivirus software. Swipe left on these ransomware Romeo and Juliet wannabes!
Key Points:
- Two ransomware gangs are using sneaky tactics to trick companies into giving them remote access.
- The groups, tracked by Sophos as STAC5143 and STAC5777, are dialing up their social engineering game.
- They start with a spam email blitz followed by deceptive Teams calls from fake IT support.
- STAC5143 is potentially linked to the notorious FIN7 group, while STAC5777 is a hands-on-keyboard enthusiast.
- Sophos suggests tightening controls on Teams calls and remote access apps to stop these bad actors in their tracks.
Already a member? Log in here