PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Ghost Ransomware Attacks Target Outdated Systems

By Tom Nawrocki
February 24, 2025
in Analysts Coverage, Fraud & Security
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
synthetic identity fraud, ransomware, Cyber Resiliency

Cyber attack with unrecognizable hooded hacker using virtual reality, digital glitch effect.

The current wave of ransomware attacks from the Chinese hacking operation known as Ghost infiltrates systems by exploiting vulnerabilities in organizational software. The Federal Bureau of Investigation warns that the hackers are primarily targeting outdated versions of software and firmware.

Ghost uses publicly available computer code to exploit security weaknesses in systems that have not been updated or patched, particularly in VPNs and firewalls. Unlike many other cybercriminal groups, Ghost’s attacks typically do not rely on phishing techniques, which have been the most notorious method of data compromises in recent years.

According to data from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA), everything from healthcare networks to religious institutions in more than 70 countries has been compromised by these attacks. Despite their widespread nature, the overall damage has been fairly limited thus far.

The group’s ransom notes threaten to sell stolen data if the ransom is not paid. However, the hacks have not resulted in the removal of significant amounts of information, such as intellectual property or personally identifiable information (PII). The FBI reported that the typical data exfiltration is less than hundreds of gigabytes of data.

In addition, Ghost hackers usually spend only a few days attacking each victim network. If an attack is not immediately successful, they tend to move on to another target.

Protecting Organizations

To protect an organization’s data, the FBI recommends patching any known vulnerabilities, including applying all available security updates to operating systems, software, and firmware. They also emphasize the importance of network segmentation  to restrict lateral movement from initially infected devices to other systems within the organization.

Maintaining regular system backups can also mitigate  concerns about stolen data. Ghost ransomware attack victims with robust backup systems have generally been able to restore operations without needing to pay a ransom.

The FBI and CISA also discourage victims from paying the ransom, noting that it only emboldens attackers while providing no guarantee that the data will be returned.

Research from Trend Micro and Waratah Analytics found that less than 10% of victims of ransom attacks surveyed refuse to pay the ransom. But those who do pay often end up paying more than initially demanded.  

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: CISACybersecurityFBIGhost RansomwarehackersRansomware

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    real-time payments merchant

    Banks Without Invoicing Services Are Missing a Small Business Opportunity

    January 23, 2026
    card program

    Should Banks Compete in the Credit Builder Card Market?

    January 22, 2026
    real-time payments, instant payments

    Getting Out in Front of Instant Payments—Before It’s Too Late

    January 21, 2026
    PhotonPay ClearBank

    PhotonPay Expands UK Local Payment Rails via New Collaboration with ClearBank

    January 20, 2026
    agentic commerce

    To Forecast Agentic Commerce Adoption, Look to Biometrics and Digital IDs

    January 16, 2026
    ar ap

    Where Financial Institutions Fit in the AR/AP Value Chain

    January 15, 2026
    digital gift card

    Present and Accounted For: Digital Gift Cards in Incentive Programs

    January 14, 2026
    payments fraud, faster payments fraud

    Faster Payments Demand Faster Fraud Detection

    January 13, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result