Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

Coop supermarket stores in Sweden have been hit by the attack. Ali Lorestani/TT

Hackers demand $70m (€58.9m) after US IT company ransomware attack

More than 1,000 companies have been affected in the US based Kaseya attack.

HACKERS ARE DEMANDING $70 million (€58.9m) in bitcoin in exchange for data stolen during a “gargantuan” attack on a US IT company that shut hundreds of Swedish supermarkets.

Researchers believe more than 1,000 companies could have been affected by the attack on Miami-based firm Kaseya, which provides IT services to some 40,000 businesses around the world.

The FBI warned yesterday that the scale of the “ransomware” attack, a form of digital hostage-taking where hackers encrypt victims’ data and then demand money for restored access, is so large that it may be “unable to respond to each victim individually”.

“It’s probably the biggest ransomware attack of all time,” said Ciaran Martin, cybersecurity professor at the University of Oxford.

“Because of the nature of the attack there’s still a lot of uncertainty over its impact,” he stressed.

But he added that because this was a “supply chain attack”, targeting a company serving thousands of firms, many of whom in turn provide IT support to smaller businesses such as car dealerships, the total number of victims was potentially huge.

Sweden’s Coop supermarket chain was among the indirect victims, with its cash registers paralysed since Friday when its IT subcontractor Visma Esscom was hit by the attack.

Most of Coop’s 800 stores were still closed today, spokesperson Kevin Bell told AFP, with the few hundred that have reopened relying on alternative payment solutions such as customers paying using their smartphones.

Cybersecurity firm ESET said it had identified victims of the hack in at least 17 countries, from South Africa to Britain to Mexico. New Zealand’s education ministry said at least two schools there had been affected.

REvil hackers suspected

Experts believe the attack was probably carried out by REvil, a Russian-speaking hacking group known as a prolific perpetrator of ransomware attacks.

A post on Happy Blog, a site on the dark web previously associated with the group, claimed responsibility for the attack and said it had infected “more than a million systems”, which if true would make this attack “absolutely gargantuan in scale”, according to Martin.

The FBI believes that REvil, which also goes by the name Sodinokibi, was behind a ransomware attack last month on global meat-processing giant JBS. The Brazil-based company ended up paying $11 million in bitcoin to the hackers.

The hackers’ blog post said they would release a decryption tool online “so everyone will be able to recover from attack in less than an hour” — if they were handed $70 million in bitcoin.

The hackers have also been reaching out to individual victims and demanding smaller ransoms, Martin added.

“As far as I understand it, they’ve been issuing demands that are about $50,000 for smaller organisations, rising to $5 million for larger organisations,” he told AFP. “We don’t know who’s paid.”

Kaseya said on Sunday it believed the damage had been restricted to a “very small number” of customers using its signature VSA software, which lets companies manage networks of computers and printers from a single point.

But cybersecurity firm Huntress Labs said in a Reddit forum that it was working with partners targeted in the attack, and that the software was manipulated “to encrypt more than 1,000 companies”.

Kaseya said it had “immediately shut down” its servers after detecting the attack on Friday and warned its VSA customers to do the same, “to prevent them from being compromised”.

The company has released a tool allowing its customers to find out whether their own computer systems have been compromised by the attack.

‘State-tolerated’ hacking 

In recent months numerous US companies, including the computer group SolarWinds and the Colonial oil pipeline, have been the victims of high-profile ransomware attacks, which the FBI blames on hackers based in Russia.

The HSE in Ireland was also a victim of a similar attack, with suspicions centred on Russian hackers.

While Washington officials do not accuse the Russian government of direct involvement in such attacks, they say the country is harbouring hackers who should be arrested.

US President Joe Biden raised the threat in talks with Russian counterpart Vladimir Putin last month, and on Saturday ordered a full investigation into the Kaseya attack.

“”Most experts would take the view that it’s highly unlikely that it’s state-directed,” Martin said of this latest cyber-assault. “It’s state-tolerated.”

© AFP 2021

Additional reporting Niall O’Connor.

Author
View 24 comments
Close
24 Comments
This is YOUR comments community. Stay civil, stay constructive, stay on topic. Please familiarise yourself with our comments policy here before taking part.
Leave a Comment
    Submit a report
    Please help us understand how this comment violates our community guidelines.
    Thank you for the feedback
    Your feedback has been sent to our team for review.

    Leave a commentcancel

     
    JournalTv
    News in 60 seconds