Beware: Sneaky Ransomware Tactics Targeting Corporate Remote Access!

Ransomware groups STAC5143 and STAC5777 are tricking companies into granting remote access for data theft. Sophos warns that victims face a spam avalanche, followed by a fake IT call urging remote software installation. To dodge these cyber tricks, keep Teams calls locked, restrict remote apps, and educate employees on email and Teams scams.

Pro Dashboard

Hot Take:

Well, it seems that cybercriminals have taken a page out of a soap opera script—bombarding you with drama and then swooping in as the “savior” IT person. It’s like the tech version of a phishing love triangle. Just remember, the only romance you should be having with your computer is with your antivirus software. Swipe left on these ransomware Romeo and Juliet wannabes!

Key Points:

  • Two ransomware gangs are using sneaky tactics to trick companies into giving them remote access.
  • The groups, tracked by Sophos as STAC5143 and STAC5777, are dialing up their social engineering game.
  • They start with a spam email blitz followed by deceptive Teams calls from fake IT support.
  • STAC5143 is potentially linked to the notorious FIN7 group, while STAC5777 is a hands-on-keyboard enthusiast.
  • Sophos suggests tightening controls on Teams calls and remote access apps to stop these bad actors in their tracks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?