WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships FBI Issues Multiple Reports on Current Ransomware Activity
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

FBI Issues Multiple Reports on Current Ransomware Activity

Author: Alec Davison

Created: Friday, October 29, 2021 - 16:07

Categories: Cybersecurity

FBI FLASH: Tactics, Techniques, and Indicators of Compromise Associated with Hello Kitty/FiveHands Ransomware

The FBI has published a TLP:WHITE FLASH providing tactics, techniques, and indicators of compromise associated with Hello Kitty/Fivehands ransomware. The FLASH indicates that Hello Kitty/Fivehands threat actors, who were first observed in January 2021, aggressively apply pressure to victims usually employing the double extortion technique. And in some instances, if the victim does not respond quickly enough or refuses to pay the ransom, the threat actors will launch a Distributed Denial of Service (DDoS) attack on the victim organization’s public facing website. The FLASH includes further technical details regarding this activity and lists recommended mitigations.

FBI Private Industry Notification: Ransomware Actors Use Significant Financial Events and Stock Valuation to Facilitate Targeting and Extortion of Victims

The FBI has published a TLP:WHITE Private Industry Notification (PIN) underscoring that ransomware actors are very likely leveraging significant financial events and stock valuation to facilitate targeting and extortion of victims. According to the PIN, “Impending events that could affect a victim’s stock value, such as announcements, mergers, and acquisitions, encourage ransomware actors to target a network or adjust their timeline for extortion where access is established.” The PIN also details multiple instances of ransomware actors in the wild using financial events and information to aid in their target acquisition and selection process. The PIN lists recommended mitigations and encourages readers to access CISA and MS-ISAC’s Joint Ransomware guide, the joint advisory from Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity, and StopRansomware.gov.

As always, members are encouraged to report suspicious or criminal activity to their local FBI field office or the FBI’s 24/7 CyberWatch (CyWatch) at (855)292-3937 or Cy*****@*bi.gov.

WaterISAC Incident Reporting
Additionally, WaterISAC encourages any members who have experienced malicious or suspicious activity to email an*****@*******ac.org, call 866-H2O-ISAC, or use the online incident reporting form.

Attached Files:

FLASH-CU-000154-MW_TLP_White PIN-20211101-001_TLPWHITE

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar