Inc Ransom Cripples PA Attorney General's Office, Exfiltrates 5.7 TB of Data

Pennsylvania Attorney General Confirms Massive Data Breach Following Inc Ransomware Attack

HIGH
November 19, 2025
7m read
RansomwareData BreachVulnerability

Impact Scope

People Affected

Unknown number of individuals, includes 1,200 staff members

Industries Affected

Government

Geographic Impact

United States (national)

Related Entities

Threat Actors

Organizations

Pennsylvania Office of the Attorney GeneralCitrix FBI

Products & Tech

Citrix NetScaler

Other

Cellebrite

CVE Identifiers

CVE-2025-5777
CRITICAL

Full Report

Executive Summary

The Pennsylvania Office of the Attorney General (OAG) has officially confirmed a significant data breach resulting from a ransomware attack by the Inc Ransom group. The threat actors exploited the CitrixBleed2 vulnerability (CVE-2025-5777) to infiltrate the agency's network in August 2025. The attack led to a three-week disruption of the OAG's IT systems and the exfiltration of approximately 5.7 terabytes of data. The compromised information is highly sensitive, containing Social Security numbers, medical information, and internal investigative files. The OAG has stated it will not pay the ransom and is currently notifying affected individuals while collaborating with the FBI.


Threat Overview

Technical Analysis

The attack chain began with the exploitation of CVE-2025-5777, a critical vulnerability in Citrix NetScaler ADC and Gateway appliances. This flaw allows for unauthenticated remote code execution, giving attackers a direct entry point into the network. This is a classic example of T1190 - Exploit Public-Facing Application.

Once inside, Inc Ransom operators likely performed the following actions:

  1. Reconnaissance: Mapped the internal network to identify high-value targets like domain controllers and file servers.
  2. Credential Access: Used tools like Mimikatz to dump credentials and escalate privileges.
  3. Lateral Movement: Moved across the network using protocols like RDP or SMB to access critical data repositories.
  4. Data Exfiltration: Staged and compressed 5.7 TB of data before exfiltrating it to actor-controlled cloud storage. The sheer volume suggests a prolonged period of undetected access.
  5. Impact: Deployed the Inc Ransom payload to encrypt files across the network, causing widespread operational disruption.

Impact Assessment

The impact on the OAG is severe and multi-faceted:

  • Operational Disruption: A three-week outage of email, phone, and website services for 1,200 staff members severely hampered law enforcement and administrative functions.
  • Data Breach: The exfiltration of 5.7 TB of data containing PII (names, SSNs) and PHI (medical information) creates a massive privacy crisis and long-term risk of identity theft and fraud for an unknown number of Pennsylvania residents.
  • Compromise of Investigations: The theft of investigative files, including information related to the use of Cellebrite forensic software, could jeopardize ongoing criminal cases, expose confidential informants, and reveal law enforcement methodologies to other criminals.
  • Reputational Damage: This incident undermines public trust in the OAG's ability to protect sensitive citizen data.
  • Financial Cost: The costs for incident response, system restoration, identity protection services for victims, and potential legal fees will be substantial.

Cyber Observables for Detection

Organizations using Citrix appliances should hunt for signs of compromise related to CVE-2025-5777:

Type Value Description
log_source Citrix ADC / Gateway logs Review logs for anomalous requests or patterns indicative of exploitation attempts against CVE-2025-5777.
network_traffic_pattern Unusual outbound data transfers Monitor for large, sustained data flows from the internal network to unknown external IP addresses or cloud storage services.
process_name powershell.exe Look for PowerShell processes executing obfuscated commands, often used for reconnaissance and lateral movement post-exploitation.
event_id 4769 (Windows) A high volume of Kerberos service ticket requests (Kerberoasting) can indicate an attacker attempting to crack service account credentials.

Detection & Response

  • Vulnerability Scanning: Continuously scan external-facing infrastructure for vulnerabilities like CVE-2025-5777. Prioritize patching based on KEV status and exploitability.
  • Network Segmentation: Implement and monitor network segmentation to prevent attackers from moving laterally from a compromised web appliance to critical internal servers. D3FEND's D3-NI - Network Isolation is a core principle.
  • Egress Filtering: Implement strict outbound traffic filtering to block connections to known malicious IPs and to detect/block large, anomalous data transfers. This aligns with D3FEND's D3-OTF - Outbound Traffic Filtering.
  • Behavioral Monitoring: Use an EDR to detect post-exploitation techniques, such as credential dumping, lateral movement using PsExec or WMI, and the execution of ransomware payloads.

Mitigation

  1. Patch Vulnerabilities: Immediately patch all internet-facing systems, especially network appliances like Citrix ADCs, per vendor advisories. This is the most effective way to prevent initial access via this vector (D3-SU - Software Update).
  2. Multi-Factor Authentication (MFA): Enforce MFA on all external access points and for all privileged accounts to mitigate the risk of compromised credentials being used for lateral movement.
  3. Network Segmentation: Isolate critical systems and data repositories from the general network. Prevent direct communication from internet-facing appliances to internal domain controllers or sensitive file shares.
  4. Backup and Recovery: Maintain offline, immutable backups of critical data and systems. Regularly test restoration procedures to ensure a swift recovery from a destructive ransomware attack.

Timeline of Events

1
August 1, 2025
Inc Ransom group conducts ransomware attack against the PA OAG, exfiltrating data.
2
November 18, 2025
The Pennsylvania Office of the Attorney General officially confirms the data breach.
3
November 19, 2025
This article was published

MITRE ATT&CK Mitigations

Timely patching of the CitrixBleed2 vulnerability would have prevented the initial intrusion.

Mapped D3FEND Techniques:

Proper network segmentation could have contained the breach and prevented the attackers from accessing sensitive internal data from the compromised edge appliance.

Mapped D3FEND Techniques:

Implementing strict egress filtering rules could have detected or blocked the exfiltration of 5.7 TB of data.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Comprehensive logging and auditing of network traffic and endpoint activity could have provided early warning of the intrusion.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To prevent catastrophic data exfiltration like the 5.7 TB theft from the OAG, organizations must implement robust outbound traffic filtering. This is not just about blocking known bad IPs. Configure perimeter firewalls and web proxies to deny all outbound traffic by default, only allowing connections on specific ports and protocols to approved destinations. For server segments, this policy should be extremely strict. Critically, deploy a solution that can analyze traffic volume and patterns. A rule should be created to trigger a high-severity alert if any internal system begins uploading terabytes, or even gigabytes, of data to an external location, especially cloud storage providers not explicitly whitelisted for business use. This technique would have turned the data exfiltration phase of the Inc Ransom attack into a massive, unmissable detection event, allowing for intervention before the full damage was done.

While patching is the ultimate fix for CVE-2025-5777, Inbound Traffic Filtering via a Web Application Firewall (WAF) can serve as a powerful virtual patch. Security teams should deploy a WAF in front of critical web-facing applications like Citrix NetScaler. Configure the WAF with rules specifically designed to detect and block the command injection patterns associated with CitrixBleed2 and similar vulnerabilities. These rules inspect incoming HTTP/HTTPS requests for malicious signatures before they reach the vulnerable appliance. This provides a crucial layer of defense, especially when a patch cannot be immediately deployed. It effectively hardens the application from the outside, mitigating the initial access vector used by Inc Ransom in this attack.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Inc RansomRansomwareData BreachCVE-2025-5777CitrixBleed2GovernmentPennsylvania

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading