Akira Ransomware Compromises Salton Winery's Data

Incident Date:

July 2, 2024

World map

Overview

Title

Akira Ransomware Compromises Salton Winery's Data

Victim

Salton Winery

Attacker

Akira

Location

Bento Gonçalves, Brazil

, Brazil

First Reported

July 2, 2024

Ransomware Attack on Salton Winery by Akira Group: An In-Depth Analysis

Company Profile: Salton Winery

Salton Winery, officially known as Vinícola Salton, is a century-old Brazilian winery established in 1910 by Italian immigrants in Bento Gonçalves, Rio Grande do Sul. As a pioneer in the Brazilian wine industry, Salton is renowned for its sparkling wines and a variety of still wines, crafted from both native and international grape varieties. With a focus on sustainability and community support, Salton has grown to become the leading brand in Brazil’s domestic sparkling wine market. The company's commitment to quality and innovation is evident in its state-of-the-art facilities and the adoption of modern winemaking technologies.

Overview of the Ransomware Attack

The ransomware group Akira has targeted Salton Winery, compromising nearly 30GB of sensitive data. This data includes HR files containing personal information of Brazilian employees, as well as critical business documents such as agreements, contracts, and financial records. The attack not only threatens the privacy of employees but also poses significant risks to the business operations and reputation of Salton Winery.

Profile of the Akira Ransomware Group

Akira, a ransomware family that emerged in March 2023, is known for its affiliation with the defunct Conti ransomware gang. The group employs double extortion tactics, which involve stealing data prior to encrypting the victim's systems and then demanding ransom for both decryption and non-disclosure of the stolen data. Akira's operations have expanded rapidly, targeting a wide range of sectors globally. The group is distinguished by its unique command-line interface styled dark web leak site and has been involved in significant ransomware incidents since its inception.

Potential Vulnerabilities and Entry Points

While specific details of the breach vector in Salton Winery’s case remain undisclosed, Akira’s known tactics include exploiting vulnerabilities in VPNs, credential theft, and lateral movement within networks. The group’s proficiency in deploying ransomware through these vectors suggests possible lapses in network security practices at Salton Winery. Given the sophistication of Akira’s operations, it is plausible that the initial breach could have occurred through a phishing attack or an unpatched system vulnerability, providing the attackers with the foothold needed to escalate privileges and disseminate the ransomware.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.