Threat Summary

Security researchers have identified an active ransomware campaign specifically targeting Saudi Arabian financial institutions. The threat actor has deployed customized attack chains that leverage known vulnerabilities in VPN appliances and remote desktop services.

Attack Methodology

  • Initial access via phishing emails impersonating SAMA regulatory notices
  • Exploitation of unpatched VPN vulnerabilities for lateral movement
  • Deployment of custom ransomware with Arabic-language ransom notes
  • Data exfiltration prior to encryption for double-extortion

Recommended Actions

Organizations should immediately patch all internet-facing VPN appliances, enable MFA on all remote access, and report suspicious activity to NCA-CERT immediately.