Heidmar Inc. Ransomware Attack by Akira Group: 20GB Data Breach

Incident Date:

July 9, 2024

World map

Overview

Title

Heidmar Inc. Ransomware Attack by Akira Group: 20GB Data Breach

Victim

Heidmar Inc.

Attacker

Akira

Location

Pireas, Greece

, Greece

First Reported

July 9, 2024

Ransomware Attack on Heidmar Inc. by Akira Group

Overview of Heidmar Inc.

Heidmar Inc. is a leading global commercial manager of tankers, specializing in the transportation of crude oil and refined petroleum products. With nearly 40 years of experience, Heidmar has established itself as the original third-party pool manager in the tanker industry. The company operates a fleet of tankers through a pooling system, enhancing operational efficiency and profitability. Heidmar's proprietary digital platform, eFleetWatch, provides full voyage and earnings transparency, fostering trust and long-term partnerships with ship owners.

Details of the Ransomware Attack

On July 10, 2024, Heidmar Inc. fell victim to a ransomware attack by the Akira group. Approximately 20GB of data was compromised during the attack. While the specifics of the leaked information have not been disclosed, the size of the leak suggests significant exposure. The attack highlights the vulnerabilities in Heidmar's digital infrastructure, particularly given their reliance on the eFleetWatch platform for operational transparency.

About the Akira Ransomware Group

Akira is a rapidly growing ransomware family that first emerged in March 2023. The group targets small to medium-sized businesses across various sectors, including transportation. Akira employs double extortion tactics, stealing data before encrypting systems and demanding a ransom for both decryption and data deletion. The group's ransom demands typically range from $200,000 to over $4 million. Akira's dark web leak site features a retro 1980s-style interface, adding a unique element to their operations.

Penetration and Impact

Akira's tactics include unauthorized access to VPNs, credential theft, and lateral movement to deploy ransomware. They use tools like RClone, FileZilla, and WinSCP for data exfiltration. In some cases, Akira has deployed a previously unreported backdoor. The group's ability to target Linux-based VMware ESXi virtual machines in addition to Windows systems demonstrates their evolving capabilities. The attack on Heidmar underscores the importance of robust cybersecurity measures, especially for companies with significant digital operations.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.