Unit 42 recently assisted a global data storage and infrastructure company that experienced a destructive ransomware attack. This attack was orchestrated by Howling Scorpius, the distributors of Akira ransomware. What began with a single click on what appeared to be a routine website CAPTCHA evolved into a 42-day (yes, we see the irony, too!) compromise that exposed critical gaps.
This incident underscores the fact that having security tools deployed is not the same as having security coverage with full visibility into your environment.
The attack began when an employee in the one division visited a compromised car dealership website. What looked like a standard bot verification — the familiar "click to prove you're human" prompt — was actually a ClickFix social engineering tactic. ClickFix disguises malware delivery as legitimate security checks, tricking users into downloading malicious payloads while believing they're simply verifying their identity.
When the employee interacted with the fake CAPTCHA, they unknowingly downloaded SectopRAT malware, giving Howling Scorpius their foothold. SectopRAT is a .NET-based remote access Trojan (RAT) that enables attackers to hide their code. It allows attackers to remotely control an infected system in order to monitor activity, steal data and execute commands in stealth mode.
The group established a backdoor on a server for command and control before conducting reconnaissance to map the virtual infrastructure. They compromised multiple privileged accounts, including domain admins and other privileged accounts, moving laterally using these protocols:
Over 42 days, the threat actors accessed domain controllers and staged massive data archives using WinRAR across multiple file shares. They pivoted from one business unit domain into the corporate environment and ultimately into cloud resources — boundaries that should have contained them.
Before deploying ransomware, they deleted the CSP’s storage containers that contained backups and compute resources, and exfiltrated nearly 1 TB of data using FileZillaPortable. Then, they deployed the Akira ransomware across servers in three separate networks. As a result, virtual machines went dark, operations stopped and the ransom demand arrived.
In this incident, the client had deployed two different enterprise-grade EDR solutions across their environment. These tools recorded the malicious activity in their data logs — every suspicious connection, every lateral movement, every file staged for exfiltration — but they generated very few alerts.
The security team had visibility in theory but not in practice. While the logs held a complete record of the attack, the lack of alerts led to that data staying hidden in plain sight until it was too late. This mirrors a broader trend we uncovered in our investigations and highlighted in the 2025 Global Incident Response Report: In 75% of the incidents we analyzed, clear evidence of malicious activity existed in the logs but went unnoticed.
The company called Unit 42 and we responded immediately by deploying our investigation toolkit, including Cortex XSIAM, across the environment to establish comprehensive visibility. Our investigation involved data stitching across multiple sources, including:
to provide a clear picture of the attacker’s movements.
We reconstructed the complete attack path and provided critical recommendations, including:
Our team also engaged directly with the threat actors for ransom negotiation, ultimately securing proof of exfiltration and negotiating the initial demand down by approximately 68%.
Through our partnership with a trusted remediation specialist, the client achieved comprehensive recovery:
This Howling Scorpius attack reveals how modern threat actors exploit the gaps between security investment and effectiveness. The client had invested in enterprise security tools, but configuration gaps, incomplete deployment and missing alert rules created blind spots that attackers navigated with ease.
The ability to move from one domain to another, all while security tools logged and generated very few alerts, demonstrates why comprehensive visibility and properly tuned detection are non-negotiable. Security teams need more than data collection; they need systems that actively identify and stop threats.
Forty-two days is a long time. When attackers have that much time to operate undetected, they will find your most valuable assets, compromise privileged accounts and position themselves for maximum impact. The question is whether security programs can see and thwart groups like Howling Scorpius before they strike.
Interested in learning more about the latest attack trends? If so, take a look at our 2025 Unit 42 Global Incident Response Report.
Unit 42 strengthens your team with the tools and expertise needed to stay ahead of threats and protect your business. With our proven strategies and insights from thousands of engagements, we’ll help your team handle the toughest situations with confidence.