Eurobulk Ltd Faces Major Ransomware Threat from Play Group

Incident Date:

September 23, 2024

World map

Overview

Title

Eurobulk Ltd Faces Major Ransomware Threat from Play Group

Victim

Eurobulk Ltd

Attacker

Play

Location

Marousi, Greece

, Greece

First Reported

September 23, 2024

Ransomware Attack on Eurobulk Ltd: A Detailed Analysis

Eurobulk Ltd, a prominent maritime management company based in Athens, Greece, has recently been targeted by the Play ransomware group. This attack has raised significant concerns within the maritime industry, given Eurobulk's critical role in managing ocean-going vessels, particularly dry bulk and container ships.

Company Profile and Industry Standing

Established in 1994, Eurobulk Ltd operates under the leadership of CEO Aristides Pittas and employs approximately 100 onshore professionals and over 1,200 maritime staff. The company manages a diverse fleet of 28 vessels, emphasizing safety and risk management. Eurobulk is recognized for its commitment to technological advancements in ship navigation and voyage optimization, aligning with global sustainability trends. Its strategic location in Greece, a key maritime hub, allows it to leverage local expertise while maintaining a global reach.

Details of the Ransomware Attack

The Play ransomware group claims to have exfiltrated a significant amount of sensitive data from Eurobulk Ltd. The compromised information reportedly includes private and personal confidential data, client documents, budget details, payroll records, accounting files, contracts, tax information, identification documents, and financial information. This breach highlights the vulnerabilities that maritime companies face, particularly those with extensive digital operations and data management systems.

About the Play Ransomware Group

Active since June 2022, the Play ransomware group, also known as PlayCrypt, has targeted various industries, including transportation, IT, and critical infrastructure. The group is known for exploiting vulnerabilities in RDP servers, FortiOS, and Microsoft Exchange, among others. Unlike typical ransomware groups, Play does not include an initial ransom demand in its notes, directing victims to contact them via email instead. This approach, along with their use of custom tools and techniques, distinguishes them in the cyber threat landscape.

Potential Vulnerabilities and Attack Vectors

Eurobulk Ltd's extensive digital infrastructure, necessary for managing its fleet and operations, may have been a target for the Play group. The ransomware group likely exploited vulnerabilities in the company's network, possibly through compromised VPN accounts or unpatched software vulnerabilities. The maritime industry's reliance on digital systems for navigation, communication, and data management makes it a lucrative target for cybercriminals.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.