{"id":617,"date":"2019-11-06T08:06:50","date_gmt":"2019-11-06T08:06:50","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=617"},"modified":"2020-10-08T05:28:29","modified_gmt":"2020-10-08T04:28:29","slug":"targeted-ransomware-attacks-hit-several-spanish-companies","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/targeted-ransomware-attacks-hit-several-spanish-companies\/","title":{"rendered":"Targeted Ransomware Attacks Hit Several Spanish Companies"},"content":{"rendered":"<div class=\"separator\"><a href=\"https:\/\/1.bp.blogspot.com\/-1Cna4TBvMm4\/XcBxpphWG2I\/AAAAAAAA1mE\/hdbEdRc4LDgWYdYNFdeb-7wBLO6PbT2xQCLcBGAsYHQ\/s728-e100\/everis-ransomware-attack.png\"><img decoding=\"async\" title=\"everis ransomware attack\" src=\"https:\/\/1.bp.blogspot.com\/-1Cna4TBvMm4\/XcBxpphWG2I\/AAAAAAAA1mE\/hdbEdRc4LDgWYdYNFdeb-7wBLO6PbT2xQCLcBGAsYHQ\/s728-e100\/everis-ransomware-attack.png\" alt=\"everis ransomware attack\" border=\"0\" data-original-height=\"380\" data-original-width=\"728\" \/><\/a><\/div>\n<p><b>Everis<\/b>, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer systems until the issue gets resolved completely.<\/p>\n<p>Ransomware is a computer virus that encrypts files on an infected system until a ransom is paid.<\/p>\n<p>According to several local media, Everis informed its employees about the devastating widespread ransomware attack, saying:<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;We are suffering a massive virus attack on the Everis network. Please keep the PCs off. The network has been disconnected with clients and between offices. We will keep you updated.&#8221;<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;Please, urgently transfer the message directly to your teams and colleagues due to standard communication problems.&#8221;<\/p><\/blockquote>\n<p>According to cybersecurity consultant\u00a0<a href=\"https:\/\/twitter.com\/ArnauEstebanell\/status\/1191325871635927040\" target=\"_blank\" rel=\"noopener noreferrer\">Arnau Estebanell Castellv\u00ed<\/a>, the malware encrypted files on Everis&#8217;s computers with an\u00a0<a href=\"https:\/\/twitter.com\/ArnauEstebanell\/status\/1191325871635927040\" target=\"_blank\" rel=\"noopener noreferrer\">extension name<\/a>\u00a0resembling the company&#8217;s name, i.e., &#8220;<b>.3v3r1s<\/b>,&#8221; which suggests the attack was highly targeted.<\/p>\n<p>At this moment, it&#8217;s unknown which specific ransomware family was used to target the company, but the attackers behind the attack reportedly demanded \u20ac750,000\u00a0(~USD 835,000) in ransom for the decryptor, a company insider\u00a0<a href=\"https:\/\/bitcoin.es\/actualidad\/mas-de-1-5-millones-de-euros-en-bitcoin-como-rescate-a-accentur-everis-y-cadena-ser\/\" target=\"_blank\" rel=\"noopener noreferrer\">informed<\/a>\u00a0bitcoin.es site.<\/p>\n<p>However, considering the highly targeted nature of the attack, the founder of VirusTotal in a tweet\u00a0<a href=\"https:\/\/twitter.com\/bquintero\/status\/1191372469942312961\" target=\"_blank\" rel=\"noopener noreferrer\">suggests<\/a>\u00a0the type of ransomware could be<b>\u00a0BitPaymer<\/b>\/<b>IEncrypt<\/b>, the same malware that was recently found exploiting a\u00a0<a href=\"https:\/\/thehackernews.com\/2019\/10\/apple-bonjour-ransomware.html\" target=\"_blank\" rel=\"noopener noreferrer\">zero-day vulnerability<\/a>\u00a0in Apple&#8217;s iTunes and iCloud software.<\/p>\n<p>Here&#8217;s the ransomware\u00a0<a href=\"https:\/\/twitter.com\/somospostpc\/status\/1191303959585198080\" target=\"_blank\" rel=\"noopener noreferrer\">message<\/a>\u00a0that was displayed on the screens of the infected computers across the company:<\/p>\n<blockquote class=\"tr_bq\"><p><i>Hi Everis, your network was hacked and encrypted.<\/i><br \/>\n<i>No free decryption software is available on the web.<\/i><br \/>\n<i>Email us at sydney.wiley@protonmail.com or evangelina.mathews@tutanota.com to get the ransom amount.<\/i><br \/>\n<i>Keep our contacts safe.<\/i><br \/>\n<i>Disclosure can lead to the impossibility of decryption.<\/i><\/p><\/blockquote>\n<p><b>What&#8217;s more?<\/b>\u00a0It seems like Everis is not the only company that suffered a ransomware attack this morning.<\/p>\n<p>Some other Spanish and European companies have reportedly also been hit by a similar ransomware malware during the same period, of which the national radio network\u00a0<b>La Cadena SER<\/b>\u00a0has\u00a0<a href=\"https:\/\/cadenaser.com\/ser\/2019\/11\/04\/sociedad\/1572862102_968725.html\" target=\"_blank\" rel=\"noopener noreferrer\">confirmed<\/a>\u00a0the cyber attack.<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;The SER chain has suffered this morning an attack of a computer virus of the ransomware type, file encrypter, which has had a serious and widespread affectation of all its computer systems,&#8221; the company said.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;Following the protocol established in cyberattacks, the SER has seen the need to disconnect all its operating computer systems.&#8221;<\/p><\/blockquote>\n<p>The company has also informed that its &#8220;technicians are already working for the progressive recovery of the local programming of each of their stations.&#8221;<\/p>\n<p>At the time of writing, it&#8217;s unclear if the hackers behind these ransomware attacks are the same, how the malware infiltrated the companies in the first place and did it contain wormable capabilities to successfully spread itself across the network.<\/p>\n<p>Though it&#8217;s unconfirmed, some people familiar with the incident also suspect attackers might have used the\u00a0<a href=\"https:\/\/thehackernews.com\/2019\/05\/bluekeep-rdp-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\">BlueKeep RDP vulnerability<\/a>\u00a0to compromise the company&#8217;s servers, whose\u00a0<a href=\"https:\/\/thehackernews.com\/2019\/11\/bluekeep-rdp-vulnerability.html\" target=\"_blank\" rel=\"noopener noreferrer\">first mass exploitation<\/a>\u00a0activity was spotted in the wild just yesterday in a separate campaign.<\/p>\n<p>The Hacker News is in contact with some of the targeted company&#8217;s employees and will update you with more information about the incident shortly.<\/p>\n<p>Meanwhile, the Spanish Department of Homeland Security has also\u00a0<a href=\"https:\/\/www.dsn.gob.es\/es\/actualidad\/sala-prensa\/ciberataques-ransomware-04-noviembre-2019\" target=\"_blank\" rel=\"noopener noreferrer\">issued a warning<\/a>\u00a0about the ongoing cyber attack and recommended users to follow basic security practices like keeping their systems updated and having a proper backup of their important data.Some other Spanish and European companies have reportedly also been hit by a similar ransomware malware during the same period, of which the national radio network\u00a0<b>La Cadena SER<\/b>\u00a0has\u00a0<a href=\"https:\/\/cadenaser.com\/ser\/2019\/11\/04\/sociedad\/1572862102_968725.html\" target=\"_blank\" rel=\"noopener noreferrer\">confirmed<\/a>\u00a0the cyber attack.<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;The SER chain has suffered this morning an attack of a computer virus of the ransomware type, file encrypter, which has had a serious and widespread affectation of all its computer systems,&#8221; the company said.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<blockquote class=\"tr_bq\"><p>&#8220;Following the protocol established in cyberattacks, the SER has seen the need to disconnect all its operating computer systems.&#8221;<\/p><\/blockquote>\n<p>The company has also informed that its &#8220;technicians are already working for the progressive recovery of the local programming of each of their stations.&#8221;<\/p>\n<p>At the time of writing, it&#8217;s unclear if the hackers behind these ransomware attacks are the same, how the malware infiltrated the companies in the first place and did it contain wormable capabilities to successfully spread itself across the network.<\/p>\n<p>Though it&#8217;s unconfirmed, some people familiar with the incident also suspect attackers might have used the\u00a0BlueKeep RDP vulnerability\u00a0to compromise the company&#8217;s servers, whose\u00a0first mass exploitation\u00a0activity was spotted in the wild just yesterday in a separate campaign.<\/p>\n<p>The Hacker News is in contact with some of the targeted company&#8217;s employees and will update you with more information about the incident shortly.<\/p>\n<p>Meanwhile, the Spanish Department of Homeland Security has also\u00a0issued a warning\u00a0about the ongoing cyber attack and recommended users to follow basic security practices like keeping their systems updated and having a proper backup of their important data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everis, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company<\/p>\n","protected":false},"author":1,"featured_media":618,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[440,433,441,444,443,448,435,430,437,449,446,436,431,438,447,434,439,442,445,432],"class_list":["post-617","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=617"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/617\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/618"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=617"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=617"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=617"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}