The Mallox ransomware gang has attacked Kirkholm Maskiningenirer. Kirkholm Maskiningenirer is a consulting engineering firm headquartered in Denmark. It specializes in machine construction and production equipment, industrial plants and steel structures, concept and production development, calculation and analysis, process and production optimization, and project management. Mallox posted Kirkholm Maskiningenirer to its data leak site on October 2nd but provided no further details. Industry analysts first detected Mallox in June 2021. The group was initially dubbed “TargetCompany” because it appended encrypted files with the target company’s name. In an interview conducted in January 2023, the threat actors responsible for Mallox clarified that each major update of the ransomware involved changing the encryption algorithm and decryptor characteristics. These updates were accompanied by modifications to file name extensions, leading to the evolution of the group's names. Earlier variants of Mallox provided a contact site with the extension ".onion" for negotiations and delivered ransom notes titled "How to decrypt files.txt." However, in later variants, the ransomware stopped using the targeted company's name as file name extensions. During mid- to late 2022, the group was referred to as Fargo due to the extension added to its encrypted files at that time. Additional extensions employed by the ransomware group included ".mallox" and ".xollam." These later variants were observed utilizing a combination of Chacha20, Curve 25519, and AES-128 algorithms for file encryption. Eventually, the ransomware group established a data leak site called Mallox, and subsequent variants dropped ransom notes labeled as "HOW TO RECOVER!!.txt."
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.