Threat IntelHIGH

Cybercrime Investigation - 130 Companies Targeted in Germany

Featured image for Cybercrime Investigation - 130 Companies Targeted in Germany
CSCSO Online
GandCrabCybercrimeRansomwareGermanyLaw Enforcement
🎯

Basically, hackers attacked 130 companies in Germany, and now police are searching for the suspects.

Quick Summary

German authorities have identified two suspects behind cyberattacks on 130 companies. The attacks caused massive financial losses, totaling around 35 million euros. This ongoing threat highlights the need for enhanced cybersecurity measures across industries.

What Happened

In a significant development in the fight against cybercrime, German authorities have identified two key suspects linked to a series of attacks on 130 companies and institutions. These cyberattacks, which occurred between 2019 and 2021, have resulted in extensive financial damage, estimated at around 35 million euros. The suspects include a leader of two hacker groups and a programmer responsible for the malware used in these attacks.

The investigation, led by the Cybercrime Center at the Karlsruhe Public Prosecutor's Office and the Baden-Württemberg State Criminal Police Office, has culminated in a global manhunt for these individuals. The attacks not only targeted private companies but also public institutions, showcasing the widespread impact of cybercrime in Germany.

Who's Affected

The victims of these cyberattacks range from small businesses to large institutions, including hospitals and cultural organizations. Notably, one company in Baden-Württemberg suffered a staggering loss of 9 million euros due to these attacks. The scale of the operation and the variety of targets indicate a well-organized group of cybercriminals operating with a clear agenda.

The attacks have raised alarms across various sectors, emphasizing the need for robust cybersecurity measures. With 25 ransom payments made, totaling approximately 1.8 million euros, the financial implications for affected organizations are severe, leading to a call for increased vigilance and protective strategies.

Tactics & Techniques

The cybercriminals employed sophisticated ransomware tactics, encrypting data on victims' servers and demanding ransom payments in untraceable Bitcoin. This method not only compromises sensitive information but also places immense pressure on victims to comply with ransom demands. Additionally, threats of leaking stolen data on dark web sites were used to coerce victims into paying.

The recent arrest of a key member of the GandCrab group, who was sentenced to seven years for his role in cyber sabotage, highlights the ongoing battle against such organized cybercrime. His involvement in disrupting networks of 22 German companies underscores the operational capabilities of these hacker groups.

Defensive Measures

In light of these incidents, organizations must adopt comprehensive cybersecurity strategies to defend against similar attacks. This includes regular security audits, employee training on recognizing phishing attempts, and implementing robust data encryption techniques.

Furthermore, companies should consider investing in cyber threat intelligence services to stay ahead of emerging threats. Collaboration with law enforcement and sharing information about cyber threats can also enhance collective security efforts. As the investigation continues, organizations must remain vigilant to protect their assets and sensitive data from future cyber threats.

🔒 Pro insight: The identification of these suspects may lead to further insights into the operational tactics of organized cybercrime groups in Europe.

Original article from

CSCSO Online
Read Full Article

Related Pings

HIGHThreat Intel

Phishing Campaign - Odd Malware Installations Observed

A phishing campaign has led to the installation of RMM tools across over 80 organizations. This ongoing threat may indicate an access-as-a-service model. Immediate vigilance is required.

Sophos News·
HIGHThreat Intel

Axios NPM Packages Compromised in Major Supply Chain Attack

Axios, a popular HTTP client, has been compromised in a supply chain attack, leading to the injection of malicious code through unauthorized npm packages.

Cyber Security News·
HIGHThreat Intel

PwC Report - Identity Compromise Fuels Supply Chain Attacks

PwC's report reveals that identity compromise is a major entry point for cyber attackers. AI enhances phishing tactics, making it crucial for organizations to strengthen their defenses. Understanding these threats can help protect sensitive data and systems.

SC Media·
HIGHThreat Intel

TeamPCP Threat Escalates - Ransomware Pivot Confirmed

TeamPCP has paused its supply chain attacks but is now pivoting to ransomware. This shift poses a significant threat to previously affected companies. Organizations must enhance their security measures to defend against this evolving risk.

Help Net Security·
HIGHThreat Intel

TA446 Hackers Deploy DarkSword Exploit Kit Against iOS Users

TA446 has launched a new campaign using the DarkSword exploit kit to target iOS users. This shift in tactics raises concerns about credential theft. Users are urged to stay vigilant against suspicious emails and keep their devices updated.

Cyber Security News·
HIGHThreat Intel

TeamPCP Supply Chain Campaign - Latest Developments Explained

The TeamPCP supply chain campaign has escalated, with Databricks investigating a compromise and AstraZeneca's data leaked. Organizations need to be aware of this evolving threat and take action to protect themselves.

SANS ISC·