Sinobi Ransomware Strikes US Manufacturer and Indian Tech Firm

'Sinobi' Ransomware Group Claims Attacks on US Manufacturer Croft and Indian Tech Company CHANGEPOND

HIGH
November 20, 2025
4m read
RansomwareThreat ActorCyberattack

Impact Scope

Affected Companies

CroftCHANGEPOND

Industries Affected

ManufacturingTechnology

Geographic Impact

United StatesIndia (global)

Related Entities

Threat Actors

sinobi

Other

sinobi ransomwareCroft CHANGEPOND

Full Report

Executive Summary

A ransomware group identifying itself as 'sinobi' has conducted two separate, successful cyberattacks against Croft, a U.S. manufacturer, and CHANGEPOND, an Indian technology firm. Both incidents were discovered on November 19, 2025, indicating a coordinated campaign by the threat actor. While technical details of the attacks, including the initial access vector and specific ransom demands, have not been disclosed, the incidents demonstrate the group's ability to target disparate industries across different continents. This activity serves as a critical reminder for organizations of all sizes and sectors to maintain a vigilant security posture against the pervasive threat of ransomware.


Threat Overview

  • Threat Actor: sinobi (a newly reported ransomware group)
  • Victims:
    • CHANGEPOND: An enterprise software and digital solutions company based in Chennai, India.
    • Croft: A manufacturer of vinyl and aluminum windows and doors based in the United States.
  • Timeline: Both attacks were discovered on November 19, 2025, in the evening hours.
  • Attack Type: Ransomware. It is highly probable that this was a double-extortion attack involving both data encryption and data exfiltration, though this is not explicitly confirmed in the source material.

Technical Analysis

The source articles do not provide specific technical details or Indicators of Compromise (IOCs). However, based on typical ransomware attack patterns, the sinobi group likely employed a multi-stage attack chain.

Probable MITRE ATT&CK TTPs:

Impact Assessment

  • CHANGEPOND (Technology Sector): An attack on a software company could lead to the theft of source code, customer data, and other intellectual property. This could disrupt their service delivery and damage their reputation as a trusted technology partner.
  • Croft (Manufacturing Sector): A ransomware attack in a manufacturing environment can halt production lines, disrupt supply chains, and delay customer orders, leading to significant financial losses. The theft of sensitive business data, such as designs, pricing, and customer lists, poses a long-term competitive risk.

For both companies, the attack likely resulted in significant business disruption, financial costs associated with recovery and remediation, and potential regulatory fines if sensitive personal data was compromised.

IOCs

No specific Indicators of Compromise (IOCs) were provided in the source articles.

Detection & Response

  • Monitor for Phishing: Since phishing is a primary vector, security teams should use email security gateways to filter malicious emails and monitor for users clicking on suspicious links or downloading untrusted attachments. This relates to D3FEND's URL Analysis (D3-UA).
  • Network Segmentation: Monitor for unusual traffic patterns between network segments. A workstation should not be communicating with a server using RDP unless explicitly authorized. This is a key part of Network Traffic Analysis (D3-NTA).
  • Endpoint Monitoring: Deploy EDR solutions to detect common ransomware behaviors, such as rapid file modification/encryption, deletion of volume shadow copies (vssadmin.exe delete shadows), and disabling of security tools.
  • Active Directory Monitoring: Monitor for signs of credential abuse, such as Kerberoasting attacks (Event ID 4769 with unusual service names) or DCSync attacks.

Mitigation

  • Security Awareness Training: Implement ongoing user training (M1017 - User Training) to help employees recognize and report phishing attempts.
  • Backup and Recovery: Maintain regular, offline, and immutable backups of critical data. Test recovery procedures frequently to ensure they are effective in a real incident.
  • Patch Management: Aggressively patch internet-facing systems and critical software to close vulnerabilities that ransomware groups exploit for initial access (M1051 - Update Software).
  • Network Segmentation: Implement network segmentation (M1030 - Network Segmentation) to limit the blast radius of a ransomware attack and prevent lateral movement.

Timeline of Events

1
November 19, 2025
Initial intrusion at Croft is believed to have occurred.
2
November 19, 2025
Data breach at CHANGEPOND was discovered.
3
November 19, 2025
Data breach at Croft was discovered.
4
November 20, 2025
This article was published

MITRE ATT&CK Mitigations

Maintaining and testing offline/immutable backups is the most critical defense for recovering from a ransomware attack.

Training users to identify and report phishing attempts can prevent the initial intrusion.

Segmenting the network can contain a ransomware infection and prevent it from spreading to critical assets.

Enforcing MFA on all remote access services (VPN, RDP) and critical accounts makes it harder for attackers to use stolen credentials.

Sources & References

Ransomware Group sinobi Hits: CHANGEPOND
HookPhish (hookphish.com) November 19, 2025
Ransomware Group sinobi Hits: Croft
HookPhish (hookphish.com) November 19, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwaresinobiData BreachManufacturingTechnology

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading