#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

40 C
Dubai
Monday, July 21, 2025
HomeAmericaSilent Ransom Group Launches Cyber Extortion Campaigns Against Law Firms Using Callback...

Silent Ransom Group Launches Cyber Extortion Campaigns Against Law Firms Using Callback Phishing

Date:

Related stories

Phish and Chips: China‑Aligned Espionage Surge Targeting Taiwan Semiconductor Industry

Between March and June 2025, Proofpoint researchers tracked three distinct...

Emergency Alert: Critical Unauthenticated RCE Discovered in Cisco ISE/ISE‑PIC

Cisco has patched three severe unauthenticated remote code execution...
spot_imgspot_imgspot_imgspot_img

The cyber threat actor Silent Ransom Group (SRG) also known as Luna Moth, Chatty Spider, and UNC3753 is aggressively targeting U.S. law firms with IT-themed social engineering and callback phishing emails to gain remote access to systems, exfiltrate sensitive data, and demand ransom payments. The threat’s escalation in early 2025 has alarmed security professionals due to its stealth, human-centric techniques, and the high-value nature of legal data.

SRG has been active since at least 2022, according to multiple FBI reports and private-sector threat intelligence sources. Initially, SRG leveraged callback phishing emails that mimicked subscription cancellation requests from legitimate-looking vendors. Victims were prompted to call a fake support line ultimately leading to the installation of remote access tools (RATs) like Zoho Assist, AnyDesk, or Atera.

But since March 2025, SRG began a more aggressive social engineering strategy: direct phone calls to employees, impersonating internal IT support staff. Victims were instructed to join remote sessions under the guise of maintenance granting attackers near-invisible access to their devices.

Once inside, SRG wastes no time on privilege escalation. Instead, they focus on data exfiltration using tools like WinSCP and Rclone, often camouflaged under different names or used in portable form to bypass administrative barriers.

“This is a chilling reminder that cyberattacks don’t need malware to be effective—just a convincing voice and a clever script,” said Rachel Amani, Director of Threat Intelligence at Middle East-based firm CyberSecure Gulf.

Why Law Firms? Why Now?

SRG appears to be targeting law firms intentionally, likely due to the high sensitivity of legal data ranging from intellectual property to financial disclosures and case strategy documents. These targets are often more susceptible to urgent-sounding social engineering and less protected than other critical infrastructure sectors.

According to the FBI bulletin issued in May 2025, law firms are now the primary victim group, although medical and insurance companies are also on SRG’s radar. The group’s naming of their extortion site (which intermittently leaks victim data) underscores their intent to amplify reputational pressure and force negotiations.

MEA and Global Implications

While most observed attacks have focused on the United States, experts warn that law firms and legal consultancies in the Middle East and Africa (MEA) should not assume immunity.

Countries in the Gulf Cooperation Council (GCC) and North Africa, increasingly digitizing legal systems and court filings, could become attractive targets. Under laws like Saudi Arabia’s Essential Cybersecurity Controls (ECC) or South Africa’s POPIA, breaches of client data could trigger steep penalties or litigation risks.

“Given the sensitivity of legal data in litigation-heavy environments like Dubai or Riyadh, this group poses a serious compliance threat,” said Dr. Ahmed El Gohary, Professor of Cybersecurity Policy at the University of Cairo.

In Europe, the attacks echo similar past campaigns tied to BazarCall and Conti spin-offs, showing how ransomware actors have shifted to malware-free, human-driven compromise paths.

MITRE ATT&CK Techniques and Indicators

MITRE ATT&CK Mapping:
- Initial Access: T1566.001 (Phishing: Spearphishing via Email)
- Execution: T1059 (Command and Scripting Interpreter)
- Persistence: T1133 (External Remote Services)
- Exfiltration: T1048.002 (Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol)

Indicators of Compromise (IOCs):
- Use of remote access tools: Zoho Assist, AnyDesk, Atera, Splashtop, Syncro
- Legitimate file transfer tools: WinSCP, Rclone (including portable versions)
- Callback phishing emails citing subscription charges
- Phone calls or voicemails claiming stolen data
- Extortion threats using anonymous group aliases

10 Key Takeaways

  1. Human-Centric Attack: Silent Ransom Group (SRG) relies on social engineering—especially impersonating IT personnel—rather than malware, making detection harder.
  2. Callback Phishing Evolution: What started as fake cancellation emails evolved into voice-based impersonation of support teams for remote access.
  3. Legal Sector in Crosshairs: Law firms are ideal targets due to the volume and sensitivity of their data, making them highly vulnerable and more likely to pay ransoms.
  4. No Malware Needed: SRG’s attacks are often malware-free, focusing on user manipulation and portable tools, evading many traditional detection systems.
  5. Rapid Data Exfiltration: Once inside, SRG skips privilege escalation and immediately transfers sensitive files using tools like WinSCP and Rclone.
  6. Reputational Leverage: Victim data leaks are used as pressure tactics on extortion sites, putting law firms at risk of public shaming and loss of client trust.
  7. Global Relevance: While U.S.-based firms are most affected, legal entities in the MEA region should prepare for possible targeting.
  8. Compliance Exposure: Breaches in regulated jurisdictions (e.g., GCC, South Africa) could lead to fines, lawsuits, and compliance failures.
  9. Ties to Past Campaigns: SRG’s playbook resembles earlier tactics from BazarCall and Conti offshoots, indicating shared methods or personnel.
  10. Proactive Defense Needed: Firms must train staff on voice phishing, use conditional access controls, and closely monitor third-party support tools.

Conclusion

The Silent Ransom Group’s shift toward socially engineered, malware-free extortion campaigns highlights the growing sophistication of cyber threats facing law firms and legal service providers. As attackers exploit trust and urgency rather than technical exploits, the line between cybersecurity and employee awareness continues to blur.

Law firms especially those operating in sensitive legal, financial, or geopolitical domains must adapt quickly. This includes strengthening verification protocols for IT requests, monitoring outbound data flows, and educating employees on the hallmarks of social engineering attacks.

The legal sector must recognize that cybersecurity is no longer just an IT issue it’s a matter of client trust, regulatory compliance, and business continuity. As SRG and similar groups evolve, only a proactive, people-aware defense strategy will suffice.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here