A significant INC ransomware operational security failure has led to the successful recovery of stolen data for a dozen U.S. organizations in healthcare, manufacturing, professional services, and technology. The breakthrough came after the digital forensics and incident response firm Cyber Centaurs investigated an attack on one of its clients.Â
During the forensic examination, researchers discovered artifacts related to the legitimate backup tool Restic. Although the tool was not used in that specific attack, its presence and associated configuration scripts provided a crucial lead.
Cyber Centaurs researchers theorized that the INC ransomware gang was likely reusing its Restic-based infrastructure across multiple campaigns. Analysis revealed:
This critical mistake allowed the research team to enumerate the attacker-controlled backup server, discovering in the process that the threat actor leveraged:
This investigation confirmed the presence of encrypted data belonging to 12 unrelated U.S. organizations affected by separate INC ransomware incidents. The team then recovered the data and coordinated with law enforcement to return it to its rightful owners.
This incident highlights how even sophisticated ransomware groups can make critical errors, as it also happened last month, when researchers exposed the LockBit 5.0 infrastructure, including a Key IP Address and domain.
For defenders, this reinforces the importance of thorough incident response. Based on their findings, the researchers developed YARA and Sigma rules to help other organizations detect suspicious Restic use in their environments.Â
INC Ransom claimed to have attacked the major automotive supplier Yazaki Group last month, and the U.S. CodeRED emergency alert system in November.