Executive Summary
In May 2024, INTERPOL led a sweeping global cybercrime crackdown titled Operation Sentinel, targeting ransomware crews, business email compromise (BEC) groups, and extortion gangs. The coordinated action resulted in the arrest of 574 individuals across multiple countries. Six major ransomware strains were decrypted, and authorities seized over $3 million in illicit funds, effectively disrupting expansive international crime networks. Attackers leveraged a mix of phishing, malware, and lateral movement to infiltrate corporate and public-sector environments, lock critical data, and demand ransom payments. The impact was both substantial and international, affecting hundreds of organizations and drawing heavy collaboration among law enforcement agencies across continents.
This case underscores the rise of global, cross-border law enforcement cooperation in tackling ransomware and financially motivated cybercrime. As threat actors become ever more sophisticated and resilient, multinational efforts and advanced decryption capabilities are now essential for effective disruption and victim support.
Why This Matters Now
Ransomware attacks continue to surge in scale and complexity, targeting critical infrastructure, healthcare, and enterprise organizations. Operation Sentinel marks a decisive step by law enforcement but highlights persistent gaps in security postures and the urgent need for proactive controls, such as zero trust segmentation and real-time threat detection, to prevent future disruptions.
Attack Path Analysis
The attack began with the compromise of an endpoint or account, likely via phishing or exposed credentials. Attackers escalated their privileges within the cloud environment through IAM abuse or credential harvesting. They then moved laterally, pivoting across cloud workloads or containers to maximize access. Command and control was established to enable persistent attacker communication with compromised systems. Exfiltration followed, with sensitive data sent to attacker-controlled destinations via covert or overt channels. The attack culminated in ransomware deployment, encrypting or destroying data to extort the victim and disrupt business operations.
Kill Chain Progression
Initial Compromise
Description
Attackers gained initial access to the cloud environment through phishing or exploitation of weakly protected or exposed interfaces, such as remote desktop or web applications.
Related CVEs
CVE-2025-49704
CVSS 9.8A critical vulnerability in Microsoft SharePoint Server allows remote code execution via specially crafted requests.
Affected Products:
Microsoft SharePoint Server – 2019, 2016, 2013
Exploit Status:
exploited in the wildCVE-2025-8088
CVSS 7.8A path traversal vulnerability in WinRAR allows attackers to write files to arbitrary locations on the file system.
Affected Products:
RARLAB WinRAR – < 7.13
Exploit Status:
exploited in the wildCVE-2025-10035
CVSS 10A deserialization vulnerability in Fortra's GoAnywhere MFT allows unauthenticated remote code execution.
Affected Products:
Fortra GoAnywhere MFT – < 7.8.4
Exploit Status:
exploited in the wildCVE-2024-1086
CVSS 7.8A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component allows local privilege escalation.
Affected Products:
Linux Kernel – < 5.10.0
Exploit Status:
exploited in the wildCVE-2025-6264
CVSS 9A privilege escalation vulnerability in Velociraptor allows arbitrary command execution and endpoint takeover.
Affected Products:
Velociraptor Velociraptor – < 0.73.4.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Phishing
Valid Accounts
Data Encrypted for Impact
Service Stop
Obtain Capabilities: Tool
Exploit Public-Facing Application
Brute Force
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Strong Authentication for Access
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
DORA – ICT Risk Management Framework
Control ID: Article 8
CISA Zero Trust Maturity Model 2.0 – Identity Verification and Least Privilege
Control ID: Identity and Access Management
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
High ransomware exposure through business email compromise targeting payment systems, requiring enhanced egress security and east-west traffic monitoring per compliance mandates.
Banking/Mortgage
Critical vulnerability to ransomware strains and BEC attacks on financial transactions, necessitating zero trust segmentation and encrypted traffic protection capabilities.
Health Care / Life Sciences
Ransomware operations threaten patient data and medical systems, demanding threat detection capabilities and HIPAA-compliant encrypted communications for protection.
Government Administration
Target for coordinated ransomware campaigns affecting public services, requiring multicloud visibility and anomaly detection to prevent data exfiltration attacks.
Sources
- Interpol-led action decrypts 6 ransomware strains, arrests hundredshttps://www.bleepingcomputer.com/news/security/interpol-led-action-decrypts-6-ransomware-strains-arrests-hundreds/Verified
- 574 arrests and USD 3 million recovered in coordinated cybercrime operation across Africahttps://www.interpol.int/en/News-and-Events/News/2025/574-arrests-and-USD-3-million-recovered-in-coordinated-cybercrime-operation-across-AfricaVerified
- Microsoft says China-based hackers exploiting critical SharePoint vulnerabilities to deploy Warlock ransomwarehttps://www.tomshardware.com/tech-industry/cyber-security/microsoft-says-china-based-hackers-exploiting-critical-sharepoint-vulnerabilities-to-deploy-warlock-ransomware-three-china-affiliated-threat-actors-seen-taking-advantageVerified
- Russian-Linked Hackers Are Exploiting a WinRAR Flaw - Here's How to Stay Safehttps://www.windowscentral.com/software-apps/new-winrar-zero-day-pc-vulnerability-exploited-by-hackers-what-you-need-to-knowVerified
- Microsoft warns critical GoAnywhere security bug is being exploited by ransomware gang, so be on your guardhttps://www.techradar.com/pro/security/microsoft-warns-critical-goanywhere-security-bug-is-being-exploited-by-ransomware-gangVerified
- US government warns Linux flaw is now being exploited for ransomware attackshttps://www.techradar.com/pro/security/us-government-warns-linux-flaw-is-now-being-exploited-for-ransomware-attacksVerified
- CVE-2025-6264 (CVSS 9.8) Velociraptor Abused in Ransomware - Purple Opshttps://www.purple-ops.io/resources-hottest-cves/velociraptor-cve-2025-6264-abuse/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Comprehensive Zero Trust segmentation, east-west visibility, egress controls, and inline threat detection would have significantly contained the attack by limiting initial access, stopping lateral movement, detecting anomalous behavior, and blocking data exfiltration. Enforcing such controls greatly reduces blast radius and ransomware impact in hybrid and multi-cloud environments.
Control: Cloud Firewall (ACF)
Mitigation: Reduces attack surface and blocks unauthorized inbound connections.
Control: Zero Trust Segmentation
Mitigation: Restricts privilege escalation attempts through least privilege and identity-based policy.
Control: East-West Traffic Security
Mitigation: Detects and blocks unauthorized internal movement across services.
Control: Inline IPS (Suricata)
Mitigation: Detects and blocks C2 traffic patterns using real-time inspection.
Control: Egress Security & Policy Enforcement
Mitigation: Prevents data exfiltration by enforcing egress controls and FQDN filtering.
Rapidly identifies and alerts on ransomware behavior or encryption at scale.
Impact at a Glance
Affected Business Functions
- Financial Transactions
- Data Management
- Customer Communications
Estimated downtime: 30 days
Estimated loss: $21,000,000
Sensitive financial and personal data of customers and employees were potentially exposed due to ransomware attacks and business email compromise schemes.
Recommended Actions
Key Takeaways & Next Steps
- • Deploy cloud-native microsegmentation and zero trust policies to tightly control workload communications and limit lateral movement.
- • Implement strict egress filtering and outbound DNS/application policies to prevent data exfiltration and disrupt ransomware command and control.
- • Enable inline intrusion prevention and threat detection for real-time identification of malicious activity, including ransomware signatures and behavioral anomalies.
- • Centralize visibility across multi-cloud and hybrid environments to ensure rapid detection and policy enforcement of anomalous traffic patterns.
- • Regularly audit and enforce least-privilege access policies, ensuring that over-privileged identities and misconfigured permissions are remediated.



