In a rare turn of events, a major operational security (OPSEC) blunder by the INC Ransomware group has led to the full recovery of stolen data for twelve U.S. companies. Cybersecurity firm Cyber Centaurs made the discovery during a forensic investigation of an attack on one of its clients. The investigators found leftover artifacts from Restic, a legitimate open-source backup tool that the gang used for data exfiltration. Crucially, the attackers hardcoded the cloud storage repository details, including access keys and passwords, into their scripts. By analyzing these artifacts, Cyber Centaurs was able to access the threat actor's reused S3-compatible storage infrastructure, where they found the encrypted data backups of a dozen different victims from sectors including healthcare, manufacturing, and technology. This incident serves as a powerful reminder that deep forensic analysis can uncover attacker mistakes and lead to positive outcomes.
winupdate.exe), PowerShell scripts, and configuration files with hardcoded credentials for the gang's S3-compatible storage.The investigation also confirmed the use of other tools by the gang, including AnyDesk for remote access and Mimikatz for credential harvesting.
The core of this success was the attacker's poor OPSEC.
T1070.004 - Indicator Removal: File Deletion) left behind the crucial Restic configuration files that unraveled their operation. Even though they used Revo Uninstaller, it was not sufficient.T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage: Using Restic to back up and exfiltrate data to S3-compatible storage.T1059.001 - Command and Scripting Interpreter: PowerShell: Used to execute the Restic backup commands.T1219 - Remote Access Software: Using AnyDesk for remote control of compromised systems.T1003 - OS Credential Dumping: Using Mimikatz (mimik.exe) to harvest credentials.T1486 - Data Encrypted for Impact: The ultimate goal of the RainINC ransomware variant.While the outcome was positive for the twelve recovered companies, the incident still highlights the severe initial impact of an INC ransomware attack:
This case demonstrates that even when data is exfiltrated, recovery can sometimes be possible through deep forensic investigation and by capitalizing on attacker errors.
Restic, Rclone, AnyDesk, and iperf3. Process execution logging is key. This aligns with D3FEND's Process Analysis (D3-PA).M1038 - Execution Prevention): Implement strict application control policies to prevent unauthorized software like Restic, AnyDesk, and other dual-use tools from running in the environment.M1037 - Filter Network Traffic): Block outbound connections to non-approved cloud storage services at the network perimeter.M1043 - Credential Access Protection): Use technologies like Windows Defender Credential Guard to protect LSASS and prevent credential dumping by tools like Mimikatz.Enable and collect detailed logs, especially command line and PowerShell logs, to allow for deep forensic analysis of attacker activity.
Mapped D3FEND Techniques:
Use application control to prevent unauthorized dual-use tools like Restic and AnyDesk from running.
Mapped D3FEND Techniques:
Strictly control outbound network connections and block traffic to unknown or unauthorized cloud storage endpoints.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats