
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

The manufacturing sector is highly dependent on a secure supply chain. Companies powering this sector are acutely aware of how a cyber attack on any part of a supply chain can bring their business to a screeching halt.
When it comes to cybersecurity protections, this sector must focus on protecting its technological supply chain, as it serves as a juicy target for cybercrminals to attack. In particular, Intel 471 has observed ransomware-as-a-service crews and network access brokers target various manufacturing companies in order to carry out their crimes.
A Worldwide Problem
Some of the biggest cybersecurity incidents in the past year show how susceptible supply chains can be with regards to a company’s IT stack. Here are some of the incidents that have struck third-party IT providers, causing a cascading problem across several industries, including manufacturing:
While Intel 471 does not have exact numbers on how many of these impacted organizations were in the manufacturing or industrial center, the above examples show how ubiquitous software can be. Wildly successful products are pervasive across IT systems of all kinds, which presents huge targets for cybercriminals to go after.
While ransomware-as-a-service gangs have announced over the past few months that they will stay quiet in the wake of high-profile attacks that have negatively impacted their operations, Intel 471 has observed attacks have continued unabated. Several different RaaS gangs have gone after organizations in the manufacturing industry, including but not limited to:
All of these groups and their affiliates go after all shapes and sizes of organizations. We’ve seen them attack companies with yearly revenue anywhere from thousands to hundreds of millions. The moving financial targets come from attackers doing their research on an organization’s finances to tailor a ransom request that an organization can ultimately pay.
If attackers can’t get into an organization through a vulnerability, they will do so through compromised credentials. It’s through this credential abuse that attackers can break into organizations’ IT systems and launch ransomware attacks. Here are some examples of network access brokers selling compromised credentials on the cybercrime underground:
The manufacturing sector is as dependent on technology as any other economic sector. With that trend likely to keep growing, it’s imperative that these companies understand where their weak spots are when it comes to cybersecurity and how the cybercrime underground will exploit them if those weaknesses are left unchecked. Keys to a successful business often rely on the internet, just as cybercriminals rely on it to carry out their crimes. By being proactive in assessing risk and closing vulnerabilities, manufacturers will prevent their technology stacks from being a target for the cybercrime underground.

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.