alphv attacks Egyptian Electric Cooperative Association

Incident Date:

October 22, 2022

World map

Overview

Title

alphv attacks Egyptian Electric Cooperative Association

Victim

Egyptian Electric Cooperative Association

Attacker

Alphv

Location

Murphysboro, USA

Illinois, USA

First Reported

October 22, 2022

Egyptian Electric Cooperative Association Suffers Ransomware Attack by ALPHV

The Egyptian Electric Cooperative Association (EECA), a key player in the Energy, Utilities & Waste sector serving parts of ten counties in southern Illinois, has recently fallen victim to a ransomware attack orchestrated by the group ALPHV. This incident was disclosed on their dark web leak site, highlighting the ongoing vulnerability of utility companies to cyber threats. EECA, with a mission centered around improving the quality of life for its members at a reasonable cost and values of integrity, accountability, teamwork, and commitment to community, now faces the challenge of responding to this cyberattack.

Ransomware attacks on utility companies are not isolated incidents, as demonstrated by the similar plight of Delta-Montrose Electric Association in Colorado in 2021. These cyberattacks pose significant risks, including operational disruptions and potential data breaches, underscoring the critical need for enhanced cybersecurity measures within the sector.

While specific details regarding the extent of the damage and the ransom demanded in the EECA attack remain undisclosed, the involvement of ALPHV as the threat actor is evident. This situation serves as a stark reminder of the persistent cyber threats facing utility providers and the importance of robust cybersecurity defenses.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.