PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Ghost Ransomware Attacks Target Outdated Systems

By Tom Nawrocki
February 24, 2025
in Analysts Coverage, Fraud & Security
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
synthetic identity fraud, ransomware, Cyber Resiliency

Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect.

The current wave of ransomware attacks from the Chinese hacking operation known as Ghost infiltrates systems by exploiting vulnerabilities in organizational software. The Federal Bureau of Investigation warns that the hackers are primarily targeting outdated versions of software and firmware.

Ghost uses publicly available computer code to exploit security weaknesses in systems that have not been updated or patched, particularly in VPNs and firewalls. Unlike many other cybercriminal groups, Ghost’s attacks typically do not rely on phishing techniques, which have been the most notorious method of data compromises in recent years.

According to data from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA), everything from healthcare networks to religious institutions in more than 70 countries has been compromised by these attacks. Despite their widespread nature, the overall damage has been fairly limited thus far.

The group’s ransom notes threaten to sell stolen data if the ransom is not paid. However, the hacks have not resulted in the removal of significant amounts of information, such as intellectual property or personally identifiable information (PII). The FBI reported that the typical data exfiltration is less than hundreds of gigabytes of data.

In addition, Ghost hackers usually spend only a few days attacking each victim network. If an attack is not immediately successful, they tend to move on to another target.

Protecting Organizations

To protect an organization’s data, the FBI recommends patching any known vulnerabilities, including applying all available security updates to operating systems, software, and firmware. They also emphasize the importance of network segmentation  to restrict lateral movement from initially infected devices to other systems within the organization.

Maintaining regular system backups can also mitigate  concerns about stolen data. Ghost ransomware attack victims with robust backup systems have generally been able to restore operations without needing to pay a ransom.

The FBI and CISA also discourage victims from paying the ransom, noting that it only emboldens attackers while providing no guarantee that the data will be returned.

Research from Trend Micro and Waratah Analytics found that less than 10% of victims of ransom attacks surveyed refuse to pay the ransom. But those who do pay often end up paying more than initially demanded.  

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CISACybersecurityFBIGhost RansomwarehackersRansomware

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    ai phishing

    The Fraud Epidemic Is Testing the Limits of Cybersecurity

    February 6, 2026
    stablecoins b2b payments

    Stablecoins and the Future of B2B Payments: Faster, Cheaper, Better

    February 5, 2026
    Payment Facilitator

    The Payment Facilitator Model as a Growth Strategy for ISVs

    February 4, 2026
    Simplifying Payment Processing? Payment Orchestration Can Help , multi-acquiring merchants

    Multi-Acquiring Is the New Standard—Are Merchants Ready?

    February 3, 2026
    ACH Network, credit-push fraud, ACH payments growth

    What’s Driving the Rapid Growth in ACH Payments

    February 2, 2026
    chatgpt payments

    How Merchants Should Navigate the Rise of Agentic AI

    January 30, 2026
    fraud passkey

    Why the Future of Financial Fraud Prevention Is Passwordless

    January 29, 2026
    payments AI

    When Can Payments Trust AI?

    January 28, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result