HC3 TLP White Alert: Indicators of Compromise Associated with OnePercent Group Ransomware - August 24, 2021

Executive Summary

The FBI shared indicators of compromise (IOCs) associated with the ransomware threat actors the OnePercent Group. The OnePercent Group uses IceID-infected phishing email attachments to install ColbaltStrike and other malware on their victims鈥 computers. The 鈥淥nePercent Group actors鈥 extortion tactics always begin with a warning and progress from a partial leak of data to a full leak of all the victim鈥檚 exfiltrated data鈥 if their ransom is not paid.

Because the OnePercent Group uses the rclone program, the FBI recommends 鈥渙rganizations be aware鈥 of the hashes associated with rclone that are included in their alert. 鈥淩clone is a command line program to manage files on cloud storage.鈥

Report

FBI 鈥 Flash Alert (CU-000149-MW) Indicators of Compromise Associated with OnePercent Group Ransomware

Impact to HPH Sector

While HC3 is not aware of any Healthcare and Public Health (HPH) Sector entities target by the OnePercent Group, IceID and ColbaltStrike malware has affected the HPH Sector in the past. Sector entities targeted by ransomware could have some or all of their data leaked if a ransom is not paid and experience disruptions to services provided to their patients and customers.

References

CISA - Additional Resources Related to the Prevention and Mitigation of Ransomware

Rclone - About rclone

Contact Information

If you have any additional questions, please contact us at .