ElDorado Ransomware Strikes Istituto di Istruzione Superiore Giulio Natta

Incident Date:

June 6, 2024

World map

Overview

Title

ElDorado Ransomware Strikes Istituto di Istruzione Superiore Giulio Natta

Victim

Istituto di Istruzione Superiore Giulio Natta

Attacker

ElDorado

Location

Bergamo, Italy

, Italy

First Reported

June 6, 2024

ElDorado Ransomware Attack on Istituto di Istruzione Superiore Giulio Natta

Overview of the Victim

The Istituto di Istruzione Superiore Giulio Natta, located in Milan, Italy, is a prominent educational institution. The school offers a comprehensive curriculum that includes specialized programs in various fields, making it a valuable resource for students, parents, and staff. The institution's website provides detailed information about its programs, events, and services. Although the exact size of the school is not disclosed, it likely has a significant number of students and staff.

Details of the Attack

In a shocking turn of events, the ransomware group ElDorado executed a sophisticated attack on the Istituto di Istruzione Superiore Giulio Natta, resulting in the theft of 40.5GB of data. The stolen data has been put up for sale on ElDorado's dark web leak site. This attack highlights the vulnerabilities educational institutions face, particularly those with potentially less fortified cybersecurity defenses.

About ElDorado Ransomware Group

ElDorado is a ransomware group that emerged in 2024, known for its double-extortion tactics. The group not only encrypts victims' files but also exfiltrates sensitive data, threatening to release it publicly if ransom demands are not met. ElDorado has claimed 15 victims over seven months, showcasing their aggressive and well-coordinated operations. They employ a variety of tactics, including phishing attacks, exploiting unpatched vulnerabilities, and weaknesses in Remote Desktop Protocol (RDP) configurations.

Penetration and Impact

ElDorado's meticulous approach involves thorough reconnaissance to identify valuable data within the targeted network. They use legitimate system administration tools for malicious purposes, making their activities harder to detect. The group exfiltrates sensitive data before encryption, adding pressure on victims to pay the ransom. The use of robust encryption algorithms makes it extremely difficult to decrypt files without the attacker's key, effectively crippling the victim's operations.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.