FBI and CISA Issue Advisory on Snatch Ransomware Targeting Critical Infrastructure Sectors

In a joint cybersecurity advisory, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have raised an alarm regarding the activities of Snatch, a notorious ransomware-as-a-service (RaaS) operation that has been wreaking havoc since at least 2018. The advisory warns that Snatch has escalated its attacks on critical infrastructure sectors, particularly focusing on the IT sector, the U.S. defense industrial base, and the food and agriculture vertical. Snatch’s evolving tactics, use of stolen data, and unique features have made it a significant threat to organizations across North America. Let’s delve into the details of this nefarious ransomware and the measures organizations can take to protect themselves.

Overview of Snatch Ransomware-as-a-Service (RaaS) Operation

Since its emergence in 2018, Snatch has become one of the most prominent ransomware-as-a-service operations in the cybercriminal landscape. With its sophisticated infrastructure and extensive network of affiliates, Snatch offers ransomware capabilities to other threat actors, enabling them to launch ransomware attacks more effectively.

Warning about Snatch Targeting Critical Infrastructure Sectors

The FBI and CISA advisory highlights the increasing threats posed by Snatch to critical infrastructure sectors. These sectors, which are the backbone of nations’ economies, are particularly attractive targets for ransomware operators seeking financial gain or potential disruption.

Evolution of Snatch’s tactics and usage of stolen data

Snatch has adapted its tactics over time, leveraging stolen data from other ransomware variants to exploit victims into paying the ransom. This not only increases the credibility of their threats but also raises concerns about the potential sale or public leak of sensitive information if the ransom demands are not met.

Snatch’s Unique Capability: Forcing Systems into Safe Mode

One of the most notable capabilities of Snatch is its ability to force Windows systems to reboot into Safe Mode. By doing so, this insidious malware can encrypt files undetected by traditional antivirus tools, as Safe Mode limits the number of running Windows services.

Safe Mode Evasion and File Encryption

Snatch’s ability to operate in Safe Mode allows it to circumvent endpoint security controls and encrypt files without detection. This stealthy approach poses a significant challenge for organizations relying solely on traditional antivirus solutions for protection.

Exfiltration of Data and Threats of Public Leak

Ransomware operators go beyond encryption and have been known to exfiltrate sensitive data from victim organizations. They threaten to publicly release or sell this data unless the ransom is paid promptly. Such extortion tactics increase the pressure on victims to comply with their demands.

Targeting weaknesses in Remote Desktop Protocol (RDP) and stolen credentials

Snatch gains initial network access by exploiting weaknesses in the Remote Desktop Protocol (RDP). Additionally, the operators have adopted the use of stolen or purchased credentials to infiltrate target networks. This combination allows them to move freely within compromised infrastructures.

Prolonged reconnaissance and use of legitimate and malicious tools

Once inside a network, Snatch operators engage in a thorough reconnaissance phase, spending months searching for specific files and folders to target. They employ a combination of both legitimate and malicious tools to achieve their objectives, making detection and mitigation challenging.

Recent signs of renewed activity and indicator alignment

Although Snatch’s activity has shown some signs of waning, recent observations indicate a limited resurgence. The indicators of compromise identified by cybersecurity experts align with those highlighted in the FBI and CISA advisory, emphasizing the importance of remaining vigilant and implementing robust security measures.

Snatch’s primary focus is on North American organizations

In the past year, Snatch’s attacks have primarily targeted North American organizations, with a staggering 70 attacks documented between July 2022 and June 2023. This regional focus underscores the need for heightened cybersecurity preparedness and response measures within this jurisdiction.

The FBI and CISA advisory serves as a critical reminder for organizations to remain proactive in their cybersecurity efforts, especially in the face of evolving ransomware threats like Snatch. It is imperative for organizations to prioritize comprehensive security measures, including implementing strong network defenses, patching vulnerabilities, regularly backing up critical data, and training employees to recognize and mitigate phishing attacks. By fortifying their cyber defenses, organizations can mitigate the risk of falling victim to Snatch and other ransomware operations, safeguarding not only their sensitive data but also the critical infrastructure sectors that underpin economies and society at large.

Explore more

Are Contractors At Risk Over Prevailing Wage Compliance?

The contracting industry faces escalating scrutiny in prevailing wage compliance, notably exemplified by the Lipinski and Taboola v. North-East Deck & Steel Supply case. Contractors across the United States find themselves navigating intricate wage laws designed to ensure fair compensation on public works projects. This burgeoning issue poses a significant liability risk, creating a pressing need for clarity and compliance

Deepfakes in 2025: Employers’ Guide to Combat Harassment

The emergence of deepfakes has introduced a new frontier of harassment challenges for employers, creating complexities in managing workplace safety and reputation. This technology generates highly realistic but fabricated videos, images, and audio, often with disturbing consequences. In 2025, perpetrators frequently use deepfakes to manipulate, intimidate, and harass employees, which has escalated the severity of workplace disputes and complicated traditional

Is Buy Now, Pay Later Fueling America’s Debt Crisis?

Amid an era marked by economic uncertainty and mounting financial strain, American households are witnessing an alarming escalation in consumer debt. As the “buy now, pay later” (BNPL) services rise in prominence, they paint an intricate landscape of convenience juxtaposed with potential long-term economic consequences. While initially appealing to consumers seeking to navigate the challenges of inflation and stagnant wages,

AI-Powered Coding Revolution: Cursor and Anthropic’s Claude

Redefining Software Development with AI The integration of artificial intelligence into software development has become a groundbreaking force transforming the landscape of coding in recent years. AI models like Claude are playing a critical role in enhancing productivity, automating repetitive tasks, and driving innovation within the programming industry. This evolution is not just about technology advancing for its own sake;

How Will AI Shape the Future of DevOps Automation Tools?

In an era marked by rapid technological advancements, the DevOps Automation Tools market is undergoing a significant transformation, with artificial intelligence playing a pivotal role. In 2025, this sector’s remarkable expansion is underscored by its substantial market valuation of USD 72.81 billion and a 26% compound annual growth rate projected through 2032. Organizations worldwide are capitalizing on AI-driven orchestration and