Ongoing Silent Ransom Group phishing extortion attacks target law firms

The FBI has issued a warning to US law firms about a persistent cyber extortion campaign being carried out by a threat group known as the Silent Ransom Group (SRG), also referred to as Luna Moth, Chatty Spider, and UNC3753. Active since 2022, the group has been using sophisticated callback phishing and social engineering tactics to infiltrate corporate networks.

According to a private industry notification released last week, SRG has been targeting legal and financial institutions by impersonating IT support personnel via email, fake websites, and phone calls. Once a victim engages, attackers direct them to initiate remote access sessions under the guise of resolving technical issues.

“Once in the victim’s device, a typical SRG attack involves minimal privilege escalation and quickly pivots to data exfiltration conducted through “WinSCP” (Windows Secure Copy) or a hidden or renamed version of “Rclone.” If the compromised device does not have administrative privileges, WinSCP portable is used to exfiltrate victim data,” the FBI said. “Although this tactic has only been observed recently, it has been highly effective and resulted in multiple compromises.”

Unlike traditional ransomware gangs, SRG does not encrypt systems. Instead, it steals sensitive files and demands ransom payments, sometimes as high as $8 million, to prevent data leaks. The group has also been known to apply pressure through phone calls to victims’ employees and by publishing data on their leak site, although not all threats of exposure are acted upon.

The cybercriminals behind SRG previously participated in the Ryuk and Conti ransomware operations via the BazarCall campaign. Following Conti’s shutdown in March 2022, the actors launched their own operation.

Back to the list

Latest Posts

Cyber Security Week in Review: January 16, 2026

In brief: Microsoft fixes a Windows zero-day flaw, Russian hackers target Ukraine posing as charities, and more.
16 January 2026

RedVDS cybercrime platform disrupted in global takedown

RedVDS sold access to disposable virtual Windows servers for as little as $24 a month, allowing criminals to run fraud and phishing operations at scale.
15 January 2026

Administrator of AVCheck malware testing service arrested in the Netherlands

The man is suspected of facilitating cybercrime by allowing malware devs to test whether their software could bypass antivirus protections.
15 January 2026