ALPHV attacks Creos
Date:
July 22, 2022
Overview
Title
ALPHV attacks Creos
Victim
Creos
Attacker
ALPHV
Location
Size of Attack
Unknown/TBD
First Reported
July 22, 2022
Last Updated
October 31, 2022
The ALPHV ransomware gang has attacked Creos. Creos is an energy company that owns and manages electricity networks and gas pipelines in Luxembourg. In statements issued on July 25th and 29th, 2022, Creos’s parent company, Encevo, said various Encevo companies had been hit with a cyberattack, rendering data inaccessible and exfiltrating files from its computers. Encevo detected the attack, which did not affect gas and electricity supply, on the night of July 22nd, 2022. ALPHV published Creos on its data leak site on July 29th, claiming to have stolen roughly 150GB of information, including contracts, agreements, passports, bills, and emails. First observed in late 2021, ALPHV/BlackCat employs a well-developed RaaS platform that encrypts by way of an AES algorithm where the AES key is encrypted using an RSA public key. ALPHV/BlackCat has the ability to disable security tools and evade analysis. ALPHV/BlackCat is thought to be the first ransomware group using RUST, a secure programming language that offers exceptional performance for concurrent processing. The ransomware also leverages Windows scripting to deploy the payload and to compromise additional hosts. The developers have also been linked to DarkSide/BlackMatter ransomware attacks and may simply be a rebranding of those campaigns. ALPHV/BlackCat also exfiltrates victim data prior to the execution of the ransomware – including from cloud-based deployments - to be leveraged in double extortion schemes to compel payment of the ransom demand. They have one of the more generous RaaS offerings, offering as much as 80-90% cut to affiliates.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.