hiveleak attacks AdaptIT

Incident Date:

July 13, 2022

World map

Overview

Title

hiveleak attacks AdaptIT

Victim

AdaptIT

Attacker

Hiveleak

Location

Noordwyk, South Africa

Midrand, South Africa

First Reported

July 13, 2022

Adapt IT Ransomware Attack: A South African Software Company Targeted by HiveLeak

Adapt IT, a South African software company and a member of Volaris Group Inc., has recently fallen victim to the ransomware group HiveLeak. The attack was disclosed on a dark web leak site, highlighting the vulnerability of even well-established tech entities. Adapt IT is recognized as a Level 1 Broad-Based Black Economic Empowerment (B-BBEE) contributor, offering specialized software and digitally-led business solutions across a diverse range of industries, including education, manufacturing, finance, energy, enterprise performance management (EPM), telecommunications, consumer security and services, and hospitality.

The company boasts a global customer base exceeding 10,000 and maintains regional offices in Durban and Cape Town, with an international presence in Mauritius, Botswana, Kenya, Nigeria, Australia, New Zealand, Singapore, and Ireland. Adapt IT's commitment to attracting and developing top talent, coupled with a strong focus on customer experience and core business operations, underscores its prominence in the tech industry.

The ransomware attack on Adapt IT underscores a significant threat to the company's operations and data integrity. Ransomware, a malicious form of malware, encrypts files on a device to render them and the systems that depend on them inoperable. Attackers then demand a ransom in exchange for decryption keys. In some instances, attackers may also steal data and threaten its release in a tactic known as "double extortion," even if they do not employ ransomware directly.

While specific vulnerabilities exploited in the attack on Adapt IT have not been disclosed, the company's size and global footprint likely make it an attractive target for cybercriminals seeking to exploit potential weaknesses in its or its clients' systems. This incident serves as a stark reminder of the critical importance of robust cybersecurity measures and the need for organizations to remain vigilant against such threats.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.