New Threat Actor: Insomnia

The “Sleeper” Threat Targeting U.S. Healthcare

Date: February 8, 2026

Threat Level: High (Active Campaign)

Classification: Ransomware-as-a-Service (RaaS) / Extortion Group

The ransomware landscape has been jolted by the sudden emergence of a new group calling itself Insomnia. First detected on February 7, 2026, the group executed a “mass-dump” strategy, listing 17 victims in a single 24-hour window.

Unlike “spray-and-pray” operations, Insomnia exhibits highly calculated behavior. Their defining characteristic is a massive dwell time (averaging ~70 days) between initial compromise and public extortion. They appear to specialize in the Healthcare and Legal sectors, targeting organizations where operational downtime is critical.


1. Executive Summary & Key Findings

  • Sudden Emergence: Insomnia appeared on February 7, 2026, with a fully functional TOR leak site and 17 simultaneous victim postings.
  • Sector Focus: The group is hyper-focused on Healthcare (53%), specifically small-to-mid-sized providers (nursing homes, dialysis centers, private practices).
  • The “Sleeper” Tactic: Analysis of the “Estimated Attack Dates” reveals that Insomnia compromises networks months in advance (dating back to October 2025) but waits nearly 70 days before triggering the encryption or extortion phase.
  • Geographic Bias: 88% of targets are based in the United States, with isolated incidents in Brazil and Singapore.
  • Infostealer Anomaly: Despite the prevalence of infostealer-led attacks in 2026, Insomnia shows a 0.0% overlap with known infostealer logs for their current victims. This suggests they are gaining access via exploited vulnerabilities (VPN/RDP) or highly targeted phishing rather than buying commodity logs.

2. Victimology & Targeting

The victim profile of Insomnia is distinct and alarming. While many major RaaS groups (like BlackCat or LockBit) claim to avoid hospitals, Insomnia appears to actively hunt them.

Sector Breakdown

  • Healthcare (9 Victims): The primary target. Victims include Carlyle Senior Care (Nursing Home), Flint Hills Dialysis (Critical Care), and SchureMed (Surgical Equipment). The targeting of dialysis and nursing facilities suggests a ruthless “pressure tactic” model—these organizations cannot afford downtime without risking patient lives.+1
  • Legal (2 Victims): Law firms like Gruel Mills Nims Pylman and Dunn and Dunn. This indicates a focus on sensitive data exfiltration for leverage.
  • Manufacturing (2 Victims): Specialized manufacturers like Parts Life, Inc. (Defense/Engineering) and DeVal LCS (Armament/Ground Support).

Geographic Heatmap

  • United States: 15 Victims (Dominant)
  • Brazil: 1 Victim (Chiarottino – Law Firm)
  • Singapore: 1 Victim (Enviro-Hub Holdings)

3. Operational TTPs (Tactics, Techniques, Procedures)

Based on the forensic timeline of the 17 disclosed victims, we can reconstruct Insomnia’s operational rhythm.

Phase 1: Silent Infiltration (The “Insomnia” Phase)

  • Dwell Time: The group sits on compromised networks for an average of 69.9 days.
    • Example: Integrated Fresh Solutions was likely compromised on Oct 8, 2025, but was not listed until Feb 7, 2026.
  • Objective: This long dwell time is likely used for:
    1. Backup Destruction: Slowly enumerating and corrupting backups to ensure encryption is irreversible.
    2. Data Mining: Identifying the most sensitive files (patient records, legal settlements) to maximize extortion leverage.

Phase 2: The Mass Wake-Up

  • Batch Extortion: Rather than trickling victims out one by one, Insomnia “woke up” on Feb 7, posting a backlog of victims simultaneously. This tactic is designed to overwhelm threat intelligence researchers and create immediate brand notoriety.

Phase 3: Infrastructure

  • Web Server: The leak site runs on nginx 1.22.1.
  • Tor Address: i62huw7ve22rpyw6lnq3kmfump2dmsg4xpveec3ere73njwatrz74gad.onion
  • Communication: They utilize the Tox protocol for negotiation, avoiding standard email which is easily blocked.

4. Technical Intelligence & IoCs

Security Operations Centers (SOCs) should hunt for the following indicators immediately.

Indicators of Compromise (IoCs)

TypeValueContext
Tor URLi62huw7ve...gad.onionPrimary Data Leak Site (DLS)
TOX IDFA21E360945F602504728A05A39758C38B6A5B5DA1969717AF05838D14FDCD3DE17455833F11Threat Actor Communication ID
Servernginx 1.22.1Web Server Banner

YARA / Hunting Rules

Currently, no unique binary samples have been publicly isolated for YARA rule generation. However, based on the target profile, defenders should monitor for:

  • Unusual Outbound Traffic: Large data uploads (exfiltration) occurring 60-90 days prior to today.
  • Lateral Movement: Review logs from Oct 2025 – Jan 2026 for suspicious RDP connections or new admin account creations.

5. Strategic Recommendations

1. Retroactive Log Review (90 Days)

Because of the ~70-day delay, current logs may show nothing. You must review logs from November 2025 and December 2025. Look for:

  • Unrecognized VPN logins.
  • “Low and slow” data exfiltration.

2. Healthcare Sector Alert

Organizations in the healthcare supply chain (specifically dialysis, nursing, and specialized clinics) should consider themselves active targets.

  • Action: Verify all external-facing remote access (Citrix/VPN) is patched and MFA-enforced.

3. Negotiation Caution

Insomnia is a new brand. There is no historical data on whether they honor decryption agreements. Proceed with extreme caution in any negotiations.


Monitor This Threat

This article is based on the initial “Day 1” dump. The TTPs may evolve rapidly. Subscribe to our threat feed for real-time updates on Insomnia’s binary analysis and decryption capabilities.