Everest attacks SFK Group
Date:
September 2, 2023
Overview
Title
Everest attacks SFK Group
Victim
SKF Group
Attacker
Everest
Location
Size of Attack
Unknown/TBD
First Reported
September 2, 2023
Last Updated
October 31, 2022
The Everest ransomware gang has attacked SFK Group. SFK Group is a Swedish company that operates in the manufacturing and engineering sectors. With a strong presence in the Nordic region, SFK Group is known for its expertise in providing comprehensive solutions for industrial processes and manufacturing systems. The company specializes in various aspects of engineering, including automation, robotics, and machinery. SFK Group's offerings cater to a broad range of industries, including automotive, aerospace, and general manufacturing. They work closely with clients to design, develop, and implement tailored solutions that improve efficiency, enhance productivity, and optimize manufacturing processes. Everest posted SFK Group to its data leak site on September 2nd but provided no further information. The Everest ransomware group has garnered attention by claiming possession of sensitive data from aeronautics firms, including NASA. While they haven't yet demanded ransom payments from victims, they've established a $30,000 price for the sale of leaked data. The group asserts access to corporate emails as an "intelligence opportunity." Targeting government offices across various states, including Argentina, Peru, and Brazil, the Russian-speaking Everest employs double extortion tactics, seeking payment for decryption keys and to prevent data leaks. Initially detected in 2018, the Everest ransomware is part of the Everbe 2.0 ransomware family, employing tools like Embrace, Hyena Locker, PainLocker, and EvilLocker. Employing tactics like lateral movement through compromised accounts and exploiting the Remote Desktop Protocol, the group targets multiple industries, especially in the Americas, capital goods, health, and public sectors. The Everest group, distinctively rare, acts as an "Initial Access Broker," selling backdoors to other criminals. This shift in approach could be to evade law enforcement or explore new monetization avenues.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.