Recently, multiple ransomware attacks have been reported targeting Taiwanese enterprises, schools, and hospitals. The hacker group Crazy Hunter exploits system vulnerabilities to conduct lateral attacks, then spreads ransomware across internal networks, encrypting files and causing service disruptions on multiple hosts.
The following known malicious programs have been identified: bb.exe, crazyhunter.exe, crazyhunter.sys, zam64.sys, go3.exe, and go.exe.
Since late January 2025, the Crazy Hunter ransomware group has targeted schools, hospitals, publicly listed companies, and corporate groups. We advise schools to verify whether their affiliated vendors have recently been affected by this ransomware group. If so, please exercise caution regarding business transactions with these vendors and assess potential data leaks. Schools are also requested to report any incidents to service@cert.tanet.edu.tw.
Preventive Measures:
Prevention is key when dealing with ransomware attacks. In addition to strengthening data backups, organizations should establish offline backups, regularly assess server security, perform system security updates, and enhance password management.
Regularly update passwords and increase password strength.
Avoid using the same administrator password for multiple servers.
Strengthen VPN security and remote access controls.