Microsoft has been tracking a threat group that stands out for its ability to cash in from data theft hacks that use broad social engineering attacks, painstaking research, and occasional physical threats.
Unlike many ransomware attack groups, #OctoTempest, as Microsoft has named the group, doesn’t encrypt data after gaining illegal access to it.
Instead, the threat actor threatens to share the data publicly unless the victim pays a hefty ransom.
To defeat targets’ defenses, the group resorts to a host of techniques, which, besides social engineering, includes SIM swaps, SMS phishing, and live voice calls.
Over time, the group has grown increasingly aggressive, at times resorting to threats of 🔹physical violence 🔹if a target doesn’t comply with instructions to turn over credentials.
https://arstechnica.com/security/2023/10/microsoft-profiles-new-threat-group-with-unusual-but-effective-practices/