S6 Ransomware Signal - March 21-27, 2026
TLP:CLEAR — Approved for Public Distribution

S6 RANSOMWARE SIGNAL

Week of March 21–27, 2026 | Published by S6 Tech


⚡ 60-SECOND VERSION

Biggest threat: The Starkiller phishing platform intercepts MFA codes in real time, authenticator apps no longer protect admin accounts.

Why it matters: 268+ Microsoft 365 organizations already compromised; this is the attack vector behind most ransomware intrusions.

Do this now: Deploy physical security keys (YubiKey, $50) for anyone who can approve payments, access customer data, or manage user accounts. M365 setup →

📋 EXECUTIVE SUMMARY

1. Traditional MFA is now a false sense of security. A new phishing-as-a-service platform called "Starkiller" intercepts MFA codes in real time—including authenticator apps. Physical security keys are now required for meaningful protection against the attack vector behind most ransomware intrusions.

2. Healthcare and legal practices face elevated targeting. This week saw 8 healthcare and 12 legal/professional services victims posted. Small practices storing SSNs, medical records, or immigration documents match this week's victim profile.

3. Tax season phishing is peaking. Microsoft tracked 29,000 users targeted in a single tax-themed campaign. Through April 15: treat every tax-related email with elevated scrutiny.


📊 METRICS & INTELLIGENCE

Metric This Week What It Means
Total Disclosed Victims 107 Sustained high volume across 32 active threat actors
US-Based Victims 41 (38.3%) US remains primary target; rest scattered across 20+ countries
Healthcare Sector Hits 8 🏪 Patient data exposure; small practices in target set
Legal/Professional Services 12 🏪 Client data (SSNs, passports, court docs) at risk
Construction Sector Hits 11 🏢 Mid-market contractors targeted for project/bid data
Tax-Season Phishing 29,000 ⚠️ Users targeted in single campaign; peak through April 15

Sources: Ransomware.live, RansomLook.io, Microsoft Security Blog


⚡ ACTIVE CAMPAIGNS

Starkiller Phishing-as-a-Service Platform 🏢

Operator: Jinkusu cybercrime group | 268+ Microsoft 365 orgs already compromised

What it does: Starkiller loads the real Microsoft or Google login page inside the attacker's infrastructure, then captures everything you type, including MFA codes, in real time. The platform uses disguised URLs like login.microsoft.com@[malicious-domain] where the "@" trick makes everything before it appear legitimate.

Why it matters: Traditional MFA (text messages, authenticator apps) provides zero protection against this technique. The platform includes real-time screen monitoring and automated Telegram alerts when credentials arrive. This is the attack vector behind most ransomware intrusions.

Source: KrebsOnSecurity

TikTok Business Account Phishing 🏪

Marketing agencies, retail, e-commerce, any company with social presence

What it does: Phishing emails target TikTok for Business accounts with credential-harvesting pages specifically designed to block security scanners. Only human visitors see the fake login page.

Business impact: Brand account hijacking, fraudulent ad spend, customer-facing scams using your brand, regulatory exposure if customer data is accessed through connected business tools.

Action: If your marketing team manages social accounts, verify any TikTok communications by logging in directly—never through email links.

Source: BleepingComputer


🎯 JUST DO THIS

Deploy physical security keys for anyone with admin access

⏱️ 15 minutes per user | 💰 $50-55 per key (buy two per user for backup)

What Replace SMS codes or authenticator apps with hardware security keys (like YubiKey) for all users who can change settings, access financial systems, or manage other user accounts
Why Now Starkiller intercepts traditional MFA codes in real time. Physical keys use cryptographic verification that cannot be captured remotely—even if someone clicks a phishing link
Microsoft 365 Security.microsoft.com → Authentication methods → FIDO2 security keys → Enable. Documentation →
Google Workspace Admin console → Security → Authentication → 2-Step Verification → Allow security keys. Documentation →
Verify It Worked Attempt login without physical key—access should be blocked. Then login with key present—access should succeed

🔍 THREAT ACTOR SPOTLIGHT

Most Active This Week: QILIN

23 victims (21.5% of all disclosures) | Targets: $10M–$500M revenue mid-market firms [VERIFY]

Operational Status: Sustained high-volume operations targeting mid-market firms—especially construction, healthcare, and retail.

Known TTPs:

  • Initial Access: Phishing with malicious attachments; exploitation of exposed RDP (Remote Desktop Protocol—remote access service often left internet-facing)
  • Lateral Movement: Credential harvesting and Active Directory enumeration (mapping of internal user accounts and permissions)
  • Extortion: Double extortion—encrypts files AND threatens data publication
Priority Action Plain English
🏪🏭🏢 1 Disable exposed RDP Don't let remote desktop be reachable from internet
🏪🏭🏢 2 Enforce MFA on all admin accounts Require second factor (preferably physical key) for privileged access
🏭🏢 3 Segment backup infrastructure Keep backups isolated so attackers can't encrypt them

Also Active: AKIRA posted 12 victims (11.2%) targeting engineering firms, manufacturing, and professional services. Explicitly advertising stolen PII (passports, SSNs, medical records) in victim posts. Four different groups hit insurance targets this week, suggesting coordinated interest in policy and claims data.


🏭 SECTOR TARGETING

🏪 Healthcare — 8 Victims | SMB PRIORITY

Threat Actors: Lynx, Qilin, INC Ransom, Black Nevas, Payload

Notable Incidents: NJ Pain Care Specialists (US), Aroostook Mental Health Services (US), Pulpdent (US), Louise Medical Center, Glenmark Pharma

Data Exposed: Patient records, insurance data, treatment histories

🏢 Construction & Building Materials — 11 Victims

Threat Actors: Qilin, Akira, Worldleaks

Notable Incidents: Kerjaya Prospek Group (Malaysia), ACR1.COM Commercial Roofing, BHS Bau (Germany), Mac Interiors, Leighton

Mid-market contractors handling project files, bid documents, and subcontractor data are in the target set.

🏪 Legal & Professional Services — 12 Victims

Threat Actors: Anubis, Akira, Black Nevas, INC Ransom

Notable Incidents: Schlam Stone & Dolan LLP (US—Fortune 500 clients), Mooers Immigration (US—claims celebrity passport data [VERIFY]), David Helfand Law

Data Types Claimed: Client passports, SSNs, court documents, immigration files


🏪 SMB REALITY CHECK

Under 50 employees with no dedicated IT staff? Here's what matters:

The Starkiller phishing platform is the threat that should change your behavior. If anyone at your company can approve wire transfers, access customer data, or manage social media, they need physical security keys—not just authenticator apps. Legal firms and healthcare practices: You saw 8 healthcare and 12 legal victims posted this week. If you store client SSNs, medical records, or immigration documents, assume you're in the target set.

Your Stack, Your Actions:

If You Use... Do This Time
Microsoft 365 Enable security keys for owners/admins 20 min
Google Workspace Enable Advanced Protection for admins 15 min
QuickBooks Online Enable 2FA + review user access list 10 min
TikTok for Business Warn marketing team: verify TikTok emails by logging in directly 5 min

📞 When to Call for Help

If you receive an email asking you to verify your Microsoft 365 or Google Workspace login and you're not 100% certain it's legitimate, stop and call your IT person or MSP before clicking anything. The 30 minutes this takes is cheaper than account takeover.

Safe to ignore this week: National Oil Ethiopia attack (you're not running on-premise Exchange), BMW supply chain breach (unless you're an automotive supplier).


🔮 LOOKING AHEAD

LLM-enabled attack automation is accelerating—but not revolutionizing—ransomware operations.

SentinelLabs research confirms large language models help ransomware operators work faster (better phishing, faster data triage, multilingual capabilities) but aren't creating fundamentally new attack techniques. Anthropic documented a threat actor using Claude Code to automate an entire extortion campaign including ransom amount calculation.

Early indicators to watch: Phishing emails with unusually fluent non-English text, ransom negotiations with sophisticated tailored pressure tactics, and faster attacker response times during active incidents.

Bottom line: Current defenses remain valid. Prioritize fundamentals (MFA, backups, patching) over AI-specific countermeasures. Adversaries are getting faster, not smarter, speed of response matters more than ever.

📅 Next Month's Priority

Extend phishing-resistant authentication (physical security keys) to all users—not just administrators. Any employee with access to sensitive data, customer information, or financial systems represents equivalent risk. Target: 100% enrollment by end of April.


CLASSIFICATION: TLP:CLEAR

Sources: Ransomware.live, RansomLook.io, KrebsOnSecurity, BleepingComputer, Huntress, Microsoft Security Blog, SentinelOne Labs

S6 Ransomware Signal

Your data is an asset. We guard it like one.

Intelligence cutoff: March 27, 2026 | Next edition: March 31, 2026

Keep reading