Watch how SentinelOne prevents and detects H0lyGh0st Ransomware. The North Korean threat actor group H0lyGh0st has been active since June 2021 and targets small-to-midsize businesses including banks, factories, schools, and more.
When deploying ransomware, H0lyGh0st attackers exfiltrate all data and later start encrypting devices. H0lyGh0st payloads can be traced back to SiennaPurple and SiennaBlue variations observed back in 2021 (written in Go). Initial delivery can vary, though some attackers have located vulnerable, public-facing servers, on which to exploit CVE-2022-26352.
Upon infection, the attackers first attempt to exfiltrate all desired data, before deploying and launching the ransomware payloads. In addition to having ransom notes dropped on their device(s), H0lyGh0st victims have also reported receiving emails and calls from attackers, alerting them to what their next steps should be.
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.