WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Security Awareness Synopsis – FBI Warnings, Ransomware, and a 100th Version Batchin’ Bot
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Security Awareness Synopsis – FBI Warnings, Ransomware, and a 100th Version Batchin’ Bot

Author: Jennifer Walker

Created: Tuesday, November 24, 2020 - 18:24

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

Multiple FBI Warnings

Over the weekend, the Federal Bureau of Investigation (FBI) issued two separate warnings, one for increasing Ragnar Locker ransomware activity and one for numerous FBI-spoofed domains being registered by unattributed cyber actors. The Ragnar Locker alert includes a FLASH with indicators of compromise and recommended mitigations. The FLASH (MU-000140-MW) can be accessed through the WaterISAC portal, here. The second warning emanates from the FBI’s Internet Crime Complaint Center (IC3) and was issued “to help the public recognize and avoid spoofed FBI-related Internet domains.” The IC3 alert (I-112320-PSA) includes a broad sampling (albeit incomplete) of spoofed domains and should be shared with end-users for better awareness of cyber threat actor tactics. Along with a reminder to verify the spelling of website and email addresses, a review of the spoofed domains provides a valuable glimpse of the types of names actors register to imitate legitimate domains. Visit Bleeping Computer for more on the spoofed FBI domains.

Bleeping Computer’s The Week in Ransomware – November 20, 2020

At this risk of being repetitive, Bleeping Computer’s The Week in Ransomware series is a must review for the numerous highlights and lowlights of this wretched menace. Many of the cybersecurity community’s best-regarded researchers and analysts contribute to dozens of reports on new variants, new developments, and ongoing ransomware activity each week. The latest observations include enduring Egregor and its print bombs, dozens of new ransomware variants – including one that’s already ramping up for tax season by targeting TurboTax tax returns, and a ransomware infrastructure that could face sanctions for being hosted in Iran.

TrickBot Gets Trickier

It seems TrickBot, the botnet commonly implanted via Emotet phishing emails and known to bring Ryuk/Conti or other ransomware along, celebrated its century release (100th version) with some new covert behavior. While the bot is known for evading detection, the group has recently added new functionality that takes advantage of commonly used built-in system tools to hide-in-plain-sight/live-off-the-land. This new functionality employs an obfuscated batch script launcher that uses the built-in Window’s command prompt to launch malicious executables. And that’s not the only new trick it has up its sleeve, the notorious TrickBot group has also implemented LightBot to perform reconnaissance to seek out high-value targets. LightBot phishing emails purport to come from human resources or the legal department about a customer complaint or the termination of the recipient’s employment.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar