INC Ransom Backup Server Security Fail Enabled 12 US Companies to Recover Their Data

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Operational Error: A security failure exposed the INC ransomware group infrastructure, containing data exfiltrated from multiple victims.
  • Data Recovery: Cybersecurity researchers accessed and recovered stolen data from 12 U.S. organizations, including those in the healthcare and manufacturing sectors.
  • Investigation Insight: The investigation revealed hardcoded credentials and repository paths for the backup tool Restic, which the threat actors used in their operations.

A significant INC ransomware operational security failure has led to the successful recovery of stolen data for a dozen U.S. organizations in healthcare, manufacturing, professional services, and technology. The breakthrough came after the digital forensics and incident response firm Cyber Centaurs investigated an attack on one of its clients. 

During the forensic examination, researchers discovered artifacts related to the legitimate backup tool Restic. Although the tool was not used in that specific attack, its presence and associated configuration scripts provided a crucial lead.

Exploiting Attacker Infrastructure for Data Recovery

Cyber Centaurs researchers theorized that the INC ransomware gang was likely reusing its Restic-based infrastructure across multiple campaigns. Analysis revealed:

Tools that INC Ransom uses | Source: Cyber Centaurs
Tools that INC Ransom uses | Source: Cyber Centaurs

This critical mistake allowed the research team to enumerate the attacker-controlled backup server, discovering in the process that the threat actor leveraged:

This investigation confirmed the presence of encrypted data belonging to 12 unrelated U.S. organizations affected by separate INC ransomware incidents. The team then recovered the data and coordinated with law enforcement to return it to its rightful owners.

Cybersecurity Best Practices and Detection

This incident highlights how even sophisticated ransomware groups can make critical errors, as it also happened last month, when researchers exposed the LockBit 5.0 infrastructure, including a Key IP Address and domain.

For defenders, this reinforces the importance of thorough incident response. Based on their findings, the researchers developed YARA and Sigma rules to help other organizations detect suspicious Restic use in their environments. 

INC Ransom claimed to have attacked the major automotive supplier Yazaki Group last month, and the U.S. CodeRED emergency alert system in November.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: