INC ransomware opsec fail allowed data recovery for 12 US orgs
Recorded: Jan. 22, 2026, 6:03 p.m.
| Original | Summarized |
INC ransomware opsec fail allowed data recovery for 12 US orgs News Featured Zendesk ticket systems hijacked in massive global spam wave Hackers breach Fortinet FortiGate devices, steal firewall configs Fake Lastpass emails pose as password vault backup alerts Hackers exploit 29 zero-days on second day of Pwn2Own Automotive Microsoft Teams to add brand impersonation warnings to calls INC ransomware opsec fail allowed data recovery for 12 US orgs Why Active Directory password resets are surging in hybrid work Microsoft updates Notepad and Paint with more AI features Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityINC ransomware opsec fail allowed data recovery for 12 US orgs INC ransomware opsec fail allowed data recovery for 12 US orgs By Bill Toulas January 22, 2026 An operational security failure allowed researchers to recover data that the INC ransomware gang stole from a dozen U.S. organizations. The Cyber Centaurs investigation began after a client U.S. organization detected ransomware encryption activity on a production SQL Server. Stolen data located on INC Ransom's backup serverSource: Cyber Centaurs Other tools found in INC Ransom's exposed infrastructureSource: Cyber Centaurs The 2026 CISO Budget Benchmark Related Articles: Backup Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Fortinet admins report patched FortiGate firewalls getting hacked Ingram Micro says ransomware attack affected 42,000 people Tesla hacked, 37 zero-days demoed at Pwn2Own Automotive 2026 Sponsor Posts Discover how phishing kits are sold and deployed. Download the full research report. Identity Governance & Threat Detection in one: Get a guided tour of our platform Overdue a password health-check? Audit your Active Directory for free Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
The Cyber Centaurs investigation, detailed in a November 2026 report, revealed a significant operational security (OpSec) failure by the INC ransomware gang, allowing the recovery of data exfiltrated from twelve U.S. organizations. The core of the discovery stemmed from the recovery of data previously stolen by INC, demonstrating a concerning trend of ransomware groups utilizing long-lived attacker-controlled assets, specifically backup servers. This revelation highlights a critical vulnerability in the operational practices of active ransomware groups. The initial incident began with a client organization’s detection of ransomware encryption activity targeting a SQL Server. INC ransomware, a Ransomware-as-a-Service (RaaS) operation that had emerged in mid-2023, executed this attack by leveraging the PerfLogs directory, a location frequently utilized by Windows for staging processes. A deeper analysis of the attack footprint uncovered additional concerning elements, including the use of the legitimate backup tool, Restic, though the exfiltration occurred during the lateral movement stage. The threat actor had not utilized Restic for data backup in this instance, but the presence of Restic-related remnants indicated a potential strategy of proactively creating and maintaining backup repositories for long-term data retention. Specifically, the investigation identified several key elements utilized by INC. Researchers detected renamed binaries such as “winupdate.exe,” alongside PowerShell scripts that executed Restic commands. These scripts contained hardcoded repository configuration variables, including access keys, repository paths, and S3 passwords for encrypted repositories. The discovery suggested that INC routinely reused this infrastructure across multiple campaigns, implying that the backup servers would continue to store encrypted victim data well after ransom negotiations or payments had concluded. This is a significant operational security failure. To validate this hypothesis, Cyber Centaurs executed a controlled, non-destructive enumeration process. This process confirmed the existence of encrypted data from twelve unrelated organizations across diverse sectors - healthcare, manufacturing, technology, and service - all within the United States. The organizations were not clients of Cyber Centaurs and the incidents were entirely distinct ransomware events. This confirmed the initial theory regarding persistent data storage on INC’s backup servers. The data was then decrypted and preserved, prompting law enforcement involvement for verification and to guide the appropriate handling of the sensitive information. Beyond the immediate incident, Cyber Centaurs established a YARA and Sigma rules library to enable defenders to proactively detect the Restic backup tool or its renamed binaries if they were present in a network environment, a critical step in preventing future attacks. The INC ransomware group had been responsible for several high-profile breaches, including incidents involving Yamaha Motor, Xerox Business Solution, Scotland’s NHS, McLaren Health Care, the Texas State Bar, Ahold Delhaize, the Panama Ministry of Economy, the Pennsylvania AG Office, and Crisis24. The investigation underscored the importance of meticulously monitoring system usage and detecting the presence of unauthorized backup tools, alongside conducting comprehensive risk assessments and bolstering operational security practices. |