UncommonX - Blog

ADVISORY—Cactus Ransomware Strikes Again: A Sophisticated Social Engineering Threat

Written by Rich Pasewark - CEO, Board Director | Feb 14, 2025 3:37:38 PM

Recently, UncommonX analysts identified a new Cactus ransomware attack, which was verified by Threat Research Engineers at Cisco TALOS Threat Intelligence and Interdiction Team. The attack leveraged advanced social engineering techniques to gain access to corporate networks.

This is not an isolated incident. We have seen multiple instances of this attack method being used against organizations, highlighting a growing trend in cyber threats that bypass traditional security measures. In this blog, we’ll outline:

  • How the attack unfolded
  • Why this threat is particularly dangerous
  • Actionable steps to protect your organization

 

Breaking down the attack

 

Why this case matters

Ransomware is adapting. The Cactus ransomware group is evolving. While many organizations have invested in firewalls, endpoint security, and vulnerability management, these technical defenses alone are not enough. The human factor remains the weakest link, and Cactus is exploiting trust and social engineering to gain access.

Key takeaways:
  • Even sophisticated security measures cannot stop an employee from being tricked.
  • Attackers are increasingly impersonating IT teams and using legitimate-looking software.
  • Traditional perimeter defenses (firewalls, geo-fencing, VPNs) are being bypassed through trusted processes and internal employee actions.

 

How to protect your organization

1. Strengthen employee awareness
  • Mandate security training for all employees on social engineering tactics.
  • Implement verification protocols for IT-related requests—employees should verify IT team requests through an internal, pre-approved communication channel.
  • Regularly conduct phishing simulations to test employee awareness.
2. Enhance remote access security
  • Restrict remote administration software installations to approved IT personnel only.
  • Block unknown IP addresses attempting to access your network, even if they originate in trusted locations (e.g., US-based).
  • Use Multi-Factor Authentication (MFA) for all system access.
3. Monitor for suspicious activity
  • Watch for unauthorized software downloads and unusual network connections to new IP addresses.
  • Enable behavioral monitoring that detects anomalies in endpoint processes, registry modifications, and file system changes.
  • Automate alerts for unusual authentication attempts and rapid login failures across multiple endpoints.
4. Implement network segmentation & access controls
  • Prevent lateral movement by segmenting network access.
  • Limit admin access to critical systems and enforce a strict least-privilege access policy.
  • Disable external inbound Teams/Zoom calls unless explicitly authorized.
5. Have a response plan ready
  • Regularly update incident response playbooks to reflect new tactics like these social engineering-based Cactus ransomware attacks.
  • Ensure backups are protected (stored offline and not accessible via standard credentials).
  • Test ransomware recovery drills to ensure swift response and containment.

 

Defend against Cactus ransomware

The Cactus ransomware group is not slowing down, and this latest attack demonstrates a shift toward targeting human vulnerabilities over technical ones. While firewalls, endpoint security, and vulnerability scanning are essential, they do not address the risk posed by social engineering and insider manipulation. 

The real vulnerability is not in your software—it’s in your users. That’s why your security strategy must include rigorous training, verification protocols, and behavior-based detection to stop these attacks before they escalate.

Immediate recommended actions:
  • Train your employees on how to recognize IT impersonation scams.
  • Restrict the ability for employees to install remote administration software.
  • Block the identified IP addresses associated with this campaign (contact us for the latest IOCs).
  • Review and tighten internal procedures for IT-related requests and implement multi-step verification.

 

Stay informed, stay proactive

Cyber threats continue to evolve, and staying ahead requires a combination of vigilance, education, and proactive defense strategies. At UncommonX, we specialize in Exposure Management solutions, providing AI-powered software and managed services that deliver real-time visibility across entire networks. Our agentless platform integrates with hundreds of IT products to analyze, prioritize, and deliver actionable insights on risks and threats. If you need assistance assessing your organization’s exposure to this threat, contact us today.