Case study banner with the headline “Deleted Shared Drive Cripples Singapore Print Firm: Second Ransomware in Two Months,” on a dark background with blue and orange wave lines.

Deleted Shared Drive Cripples Singapore Print Firm as It Suffers Second Ransomware Attack in Two Months

LAST EDITED:
PUBLISHED:
January 23, 2026

LockBit 5.0 broke into a Singapore print services firm via weak VPN credentials, encrypted a file server, then wiped NAS volumes. Blackpanda traced the path.

Key Facts

Organisation
Singapore-based commercial print services provider (anonymised)
Threat
LockBit 5.0 ransomware
Initial access
Valid VPN credentials (weak password) with no MFA
Impact
File server encryption, then destructive NAS volume deletion and recreation weeks later
Core issue
Identity compromise + overly permissive VPN-to-server access rules

What this case shows

  • “Recovery” is not containment if compromised credentials still work.
  • NAS sabotage can be the second act — more destructive than encryption.
  • Least-privilege VPN segmentation and MFA reduce blast radius fast.

Need help validating scope or preventing repeat attacks? Explore ransomware response and incident response readiness.

Summary A Singapore-based commercial print services provider first thought it had “contained” a ransomware incident when a key server was encrypted and then restored. Then the attacker came back. Weeks later, a network attached storage (NAS) volume was deleted and recreated — a destructive move that can permanently erase structure and continuity even when backups exist.

Blackpanda was engaged to reconstruct how the intruder got in, what they touched, whether data theft occurred, and why a second, more destructive event followed after a period of dormancy. The investigation focused on evidence that could be proven: authentication activity, lateral movement traces, endpoint artefacts, and NAS logs — while clearly documenting where visibility gaps limited certainty.

The findings pointed to a familiar root cause with outsized consequences: valid credentials on a weak-password account, no MFA, and an overly permissive VPN-to-server access policy that made internal systems reachable to far more users than necessary. The result was a two‑stage crime — encryption first, destruction later — enabled by identity compromise and weak segmentation.

Containing a LockBit Ransomware Intrusion at a Singapore-Based Print Services Provider from September to October 2025

At a glance

  • Customer: Singapore-based commercial print services provider (anonymised)
  • Incident type: Ransomware intrusion followed by destructive network attached storage (NAS) volume recreation
  • Ransomware observed: LockBit 5.0 (confirmed by artefacts and sample analysis)
  • Extortion signal: A separate leak site later published several images from the environment, suggesting selective leakage rather than large-scale dumps
  • Environment: Windows servers, Active Directory, SSL VPN / firewall access, RDP, Synology NAS
  • Impact confirmed: File server encryption; later NAS shared-folder access and NAS volume deletion/recreation
  • Blackpanda services: digital forensics and incident response, log analysis, scope validation, data-theft risk assessment, containment guidance, endpoint monitoring rollout support

CHALLENGE

A ransomware “incident” that didn’t end when systems came back

The first event was a classic ransomware outcome: an internal file server was encrypted, disrupting business-critical access. But the deeper risk wasn’t only the encryption — it was whether the attacker still had working access after the organisation restored operations.

That risk materialised. Over a month later, the attacker reappeared and a NAS volume was deleted and recreated — an act that can destroy data organisation and continuity even when individual files may exist elsewhere. This wasn’t just disruption; it was sabotage.

Leadership needed answers that were both fast and defensible:

  • How did the attacker break in — and was that route still open?
  • Did compromise extend beyond the initial server(s)?
  • Was data accessed or stolen before or after encryption?
  • Why did the attacker return weeks later, and what did they do on the NAS?

“Valid credentials” is the hardest kind of break-in to spot quickly

The investigation determined initial access came via valid credentials for an Active Directory account with an extremely weak password and MFA was not enabled — exactly the scenario that makes attacks blend into “normal” remote access activity.

Compounding this, VPN-to-internal access rules were overly permissive: a firewall policy allowed broad access from the SSL VPN interface into a server VLAN, and that access extended beyond tightly controlled admin groups to a wider user group. That widened the blast radius of any single compromised identity.

A real-world constraint: visibility gaps when you need proof

The client’s ability to be definitive about attacker activity — especially data exfiltration — was limited by two critical evidence gaps:

  • Windows audit logs on a key server were cleared during the intrusion window.
  • Firewall traffic logs were missing for a period overlapping the intrusion and suspected exfiltration activity.

This is a common incident reality: executives want certainty, but responders must separate what’s provable from what’s merely plausible — and document both.

SOLUTION

1) Rapid triage and evidence-led scoping across two related incidents

Blackpanda’s incident responders were engaged to investigate two incidents as a single narrative: (1) the ransomware event and (2) the later NAS destruction. The approach prioritised what would most directly reduce reinfection risk and enable informed decisions: scope first, then root cause, then hardening.

Initial actions included:

  • Reviewing evidence collected by the IT vendor (server artefacts, event logs, firewall configuration context, NAS logs).
  • Reconstructing authentication and lateral movement patterns to identify how the intruder navigated the environment.
  • Supporting deployment of endpoint monitoring coverage using managed detection and response to improve visibility and reduce the chance of silent re-entry.

2) Rebuilding the attacker’s route: VPN entry, lateral movement, and ransomware execution

Blackpanda reconstructed a path consistent with a credential-driven intrusion:

  • Initial entry: Access using valid credentials over VPN/remote access pathways.
  • Lateral movement: Multiple RDP sessions into internal servers were identified, including movement that positioned the attacker to reach business-critical systems.
  • Ransomware execution: The ransomware binary was executed on the file server during the incident window.

Blackpanda also highlighted the enabling control weakness that made this easier: VPN access rules allowed too much reach into the server VLAN for too many authenticated users, increasing the chance that a single compromised account could reach high-value assets.

3) Data-theft assessment: separating ransomware mechanics from leakage signals

Blackpanda assessed data-theft likelihood from multiple angles:

  • Ransomware capability: Analysis of the ransomware sample found no built-in exfiltration module — an important detail, because many ransomware operations steal data using separate tooling rather than “inside” the encryptor.
  • Leak-site signal: During monitoring, a leak site published several images (e.g., operational documents) sourced from the environment. The contents of the images had suggested partial, selective leakage rather than a bulk archive dump — but it is still a meaningful business risk.
  • Honest uncertainty: Missing firewall logs and cleared audit logs limited the ability to conclusively validate the full extent of any outbound transfers. The outcome was evidence-led, with uncertainty clearly documented rather than masked.

4) Explaining the second act: dormancy, persistence, and destructive NAS activity

The second incident was not random. Evidence showed the attacker remained dormant and later resumed activity using compromised credentials, then accessed the NAS and enumerated multiple shared folders before the volume recreation event.

This matters because it changes how organisations should respond: encryption may be “the loud moment,” but persistent credential access is the real threat — especially when the attacker returns for sabotage or leverage.

5) Containment and hardening actions aligned to what was actually abused

Based on the attacker’s proven playbook, recommendations focused on identity control, segmentation, and monitoring:

  • Enforce MFA for VPN and privileged access (including service/admin accounts).
  • Eliminate weak-password exposure, rotate compromised credentials, and reduce credential reuse risk.
  • Tighten VPN-to-internal firewall policy to least privilege (restrict reachable subnets/services; limit access groups).
  • Reduce RDP exposure and enforce admin segmentation (jump hosts, restricted admin workstations, tiered admin).
  • Harden NAS admin access, logging, and protection against destructive operations (including volume-level safeguards).
  • Improve log retention and centralised logging (so future investigations are not forced to operate with blind spots).

For context on ransomware tactics and response fundamentals, see the MITRE ATT&CK Enterprise Matrix

and CISA ransomware guidance.

RESULTS

1) A clear narrative: one intrusion, two impacts

The client received a defensible storyline that connected two events into a single intrusion pattern: initial credential-based access led to ransomware encryption, and persistent access later enabled destructive NAS activity. That clarity matters for leadership decisions, insurers, and incident reporting.

2) Evidence-based view of data-leak exposure

The investigation surfaced a concrete external exposure signal — several images showing data posted online — without overstating what could not be proven due to missing logs. This enabled realistic risk management: respond to the leak signal, while avoiding unfounded claims about “everything was stolen.”

3) A practical hardening roadmap tied to attacker behaviour

Rather than generic security advice, the recommendations mapped directly to the routes the attacker used: weak credentials, no MFA, and insufficient telemetry. The result: a prioritised plan to reduce repeatability and shrink blast radius.

4) Improved monitoring posture during and after recovery

The engagement also supported expansion of endpoint visibility via EDR rollout, improving the organisation’s ability to detect suspicious behaviour earlier and respond with fewer unknowns.

FAQ: LockBit intrusions, VPN credential abuse, and NAS sabotage

Q1. How did the attacker get in?

The first confirmed access was achieved using valid credentials for an account with an extremely weak password that had no MFA enabled, facilitating a VPN-based entry without needing a loud exploit chain.

Q2. Why did the attacker come back weeks later?

This pattern is consistent with persistent credential access: once a threat actor has working credentials (and remote access paths remain permissive), they can re-enter later for additional leverage — including sabotage of storage and backups.

Q3. Was data stolen?

A leak site published several images sourced from the environment, indicating at least limited, selective data leakage. However, missing firewall logs and cleared audit logs limited the ability to conclusively validate the full extent of any outbound transfers.

Q4. Why is an overly permissive VPN policy so risky?

If VPN users can reach broad internal subnets and services, a single compromised user credential can become a pathway to high-value servers. Least-privilege access rules and tighter group scoping reduce blast radius.

Q5. What are the fastest controls that reduce repeat risk after ransomware?

Prioritise MFA for remote access, privileged credential resets, least-privilege VPN segmentation, tighter RDP pathways, and centralised logging with longer retention so future investigations don’t start with blind spots.

What this means for you

Ransomware isn’t always “one night of chaos.” Sometimes it’s a burglar who keeps the keys — and returns after you’ve cleaned up. If your organisation relies on VPN access without MFA, broad firewall policies, or short log retention, the next incident can escalate from disruption to irreversible destruction.

Blackpanda’s incident responders help teams contain quickly, validate scope with evidence, and harden the exact routes criminals abused — so recovery actually sticks.

If you need help now, explore our ransomware response and incident response readiness options.