National Cyber Warfare Foundation (NCWF) Forums


Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric


0 user ratings
2024-02-20 07:46:24
milo
Ransomware , Breach
The Cactus ransomware gang claims the theft of 1.5TB of data from the Energy management and industrial automation firm Schneider Electric. The Cactus ransomware group claims responsibility for pilfering 1.5TB of data from the Energy management and industrial automation giant Schneider Electric. Schneider Electric is a multinational company that specializes in energy management, industrial automation, […

The Cactus ransomware gang claims the theft of 1.5TB of data from the Energy management and industrial automation firm Schneider Electric.





The Cactus ransomware group claims responsibility for pilfering 1.5TB of data from the Energy management and industrial automation giant Schneider Electric.





Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation.





In January, BleepingComputer first reported the attack that hit the Sustainability Business division of the company on January 17th. At the time, BleepingComputer contacted Schneider Electric which confirmed the data breach.





The attack impacted the services of Schneider Electric’s Resource Advisor cloud platform causing outages.





Schneider Electric said that other divisions of the company were not impacted by the cyber attack.





Today The Cactus ransomware gang published 25MB of allegedly stolen data on its Tor leak site.





Schneider Electric Cactus ransomware




The gang also published several pictures of passports and company documents as proof of the hack.











The Cactus ransomware operation has been active since March 2023, Kroll researchers reported that the ransomware strain is notable for the use of encryption to protect the ransomware binary.





Cactus ransomware uses the SoftPerfect Network Scanner (netscan) to look for other targets on the network along with PowerShell commands to enumerate endpoints. The ransomware identifies user accounts by viewing successful logins in Windows Event Viewer, it also uses a modified variant of the open-source PSnmap Tool.





The Cactus ransomware relies on multiple legitimate tools (e.g. Splashtop, AnyDesk, SuperOps RMM) to achieve remote access and uses Cobalt Strike and the proxy tool Chisel in post-exploitation activities.





Once the malware has escalated the privileges on a machine, the threat actors use a batch script to uninstall popular antivirus solutions installed on the machine.





Cactus uses the Rclone tool for data exfiltration and used a PowerShell script called TotalExec, which was used in the past by BlackBasta ransomware operators, to automate the deployment of the encryption process.





In early January, the Cactus ransomware group claimed to have hacked Coop, one of the largest retail and grocery providers in Sweden.





Follow me on Twitter: @securityaffairs and Facebook and Mastodon





Pierluigi Paganini





(SecurityAffairs – hacking, ransomware)







Source: SecurityAffairs
Source Link: https://securityaffairs.com/159353/hacking/cactus-ransomware-gang-schneider-electric.html


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Ransomware
Breach



© Copyright 2012 through 2024 - National Cyber War Foundation - All rights reserved worldwide.