The Tengu ransomware group has publicly claimed a successful cyberattack against UniCursos, a Brazilian educational institution specializing in preparatory courses. On October 23, 2025, the group added UniCursos to its dark web leak site, threatening to release sensitive data if a ransom is not paid. This incident is another example of the 'double extortion' tactic favored by modern ransomware gangs, where they both encrypt a victim's files and exfiltrate data for additional leverage. The education sector remains a prime target for such attacks due to its often limited cybersecurity resources and the large amounts of personally identifiable information (PII) it manages.
This attack fits a common pattern where ransomware groups target small to medium-sized organizations that are perceived as having weaker defenses and a high incentive to pay to restore operations and prevent data leakage. The education sector is particularly vulnerable, holding sensitive data on students (including minors) and staff.
While no specific technical details of the attack on UniCursos have been released, ransomware attacks typically follow a standard lifecycle:
No specific Indicators of Compromise (IOCs) have been publicly released.
vssadmin), and the creation of ransom note files. This aligns with D3FEND's File Analysis.The most critical mitigation for ransomware is having regularly tested, offline, and immutable backups.
Train users to recognize and report phishing, a primary initial access vector for ransomware.
Keep all systems and applications patched to prevent exploitation of vulnerabilities for initial access.
Mapped D3FEND Techniques:
For any organization, especially in a targeted sector like education, the most fundamental defense against ransomware like Tengu is a robust and tested backup strategy. This goes beyond simple backups. Follow the 3-2-1 rule: maintain at least three copies of your data, on two different types of media, with at least one copy stored off-site and air-gapped or immutable. An immutable backup cannot be altered or deleted by attackers, even if they compromise the backup administrator's credentials. Regularly test your ability to restore from these backups to ensure they are viable. This ensures that if UniCursos had such a system, they could restore their operations without needing to consider paying the ransom.
To detect a ransomware attack in progress, organizations should use EDR or file integrity monitoring tools to perform real-time file analysis. Configure these tools to detect and alert on common ransomware behaviors. Key indicators include: a process rapidly reading, modifying, and renaming a large number of files; the creation of files with known ransomware extensions; or the appearance of files named 'ransom.txt' or similar in multiple directories. Another powerful technique is the use of 'honeypot' files or canary files. These are decoy documents placed on file shares. Any modification to these files should trigger a high-priority alert and an automated response, such as isolating the affected host from the network, to stop the encryption process before it spreads.
To combat the 'double extortion' tactic used by Tengu, where data is stolen before encryption, organizations must implement strict outbound traffic filtering and monitoring. Configure network firewalls to block all outbound traffic by default and only allow connections to known-good destinations on standard ports. Deploy a Data Loss Prevention (DLP) solution to inspect allowed outbound traffic for sensitive data patterns (e.g., student ID numbers, PII). A large, unexpected data transfer from a file server to an unknown external IP address is a major indicator of pre-ransomware data exfiltration. Detecting and blocking this transfer can turn a devastating double-extortion attack into a more manageable encryption-only incident.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats