A ransomware group identifying itself as 'sinobi' has conducted two separate, successful cyberattacks against Croft, a U.S. manufacturer, and CHANGEPOND, an Indian technology firm. Both incidents were discovered on November 19, 2025, indicating a coordinated campaign by the threat actor. While technical details of the attacks, including the initial access vector and specific ransom demands, have not been disclosed, the incidents demonstrate the group's ability to target disparate industries across different continents. This activity serves as a critical reminder for organizations of all sizes and sectors to maintain a vigilant security posture against the pervasive threat of ransomware.
The source articles do not provide specific technical details or Indicators of Compromise (IOCs). However, based on typical ransomware attack patterns, the sinobi group likely employed a multi-stage attack chain.
T1566 - Phishing, exploiting unpatched public-facing applications (T1190 - Exploit Public-Facing Application), or using stolen credentials (T1078 - Valid Accounts).T1059.001 - PowerShell or T1059.003 - Windows Command Shell for running malicious scripts.T1547.001 - Registry Run Keys / Startup Folder or creating new services (T1543.003 - Create or Modify System Process: Windows Service).T1003 - OS Credential Dumping.T1021.001 - Remote Desktop Protocol) or SMB (T1021.002 - SMB/Windows Admin Shares).T1486 - Data Encrypted for Impact to encrypt files and T1041 - Exfiltrate Data Over C2 Channel to steal data for double extortion.For both companies, the attack likely resulted in significant business disruption, financial costs associated with recovery and remediation, and potential regulatory fines if sensitive personal data was compromised.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
vssadmin.exe delete shadows), and disabling of security tools.M1017 - User Training) to help employees recognize and report phishing attempts.M1051 - Update Software).M1030 - Network Segmentation) to limit the blast radius of a ransomware attack and prevent lateral movement.Maintaining and testing offline/immutable backups is the most critical defense for recovering from a ransomware attack.
Training users to identify and report phishing attempts can prevent the initial intrusion.
Segmenting the network can contain a ransomware infection and prevent it from spreading to critical assets.
Enforcing MFA on all remote access services (VPN, RDP) and critical accounts makes it harder for attackers to use stolen credentials.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats