Meow Ransomware Hits Myelec Electrical Wholesalers in Data Breach

Incident Date:

September 10, 2024

World map

Overview

Title

Meow Ransomware Hits Myelec Electrical Wholesalers in Data Breach

Victim

Myelec Electrical

Attacker

Meow

Location

Joondalup, Australia

, Australia

First Reported

September 10, 2024

Meow Ransomware Group Claims Attack on Myelec Electrical Wholesalers

In a recent development, the Meow Ransomware group has claimed responsibility for a cyberattack on Myelec Electrical Wholesalers, a prominent electrical wholesaler based in Western Australia. The group has listed 110 GB of confidential data on their dark web leak site, asserting that the stolen information includes contracts, invoices, sales reports, company bank documents, employee information, and client details.

About Myelec Electrical Wholesalers

Established in 2006, Myelec Electrical Wholesalers has grown from a small operation with just three employees to a significant player in the electrical wholesale industry in Western Australia. The company now employs over 55 staff members across nine branches. Myelec specializes in providing a wide range of electrical products and solutions tailored to various sectors, including domestic, industrial, commercial, mining, and government industries. Their commitment to quality and customer satisfaction has been a cornerstone of their success.

Attack Overview

The initial breach was reported in late August when the Lynx ransomware group listed Myelec on its dark web leak site, claiming to have stolen data from the company. The exposed information included names, email addresses, and confidential business details. Myelec acknowledged the incident but did not provide additional details. Now, the Meow Ransomware group has also claimed to possess data from Myelec, listing it for sale. Myelec has stated that this is not a new incident but rather duplicated data from the initial Lynx breach.

About Meow Ransomware Group

Meow Ransomware emerged in late 2022 and has been associated with the Conti v2 ransomware variant. The group uses the ChaCha20 and RSA-4096 algorithms to encrypt data on compromised servers. They maintain a data leak site where they list victims who have not paid the ransom. Meow Ransomware frequently targets industries with sensitive data, such as healthcare and medical research. They employ various infection methods, including phishing emails, exploit kits, Remote Desktop Protocol (RDP) vulnerabilities, and malvertising.

Potential Vulnerabilities

Myelec's rapid growth and extensive operations may have made it an attractive target for ransomware groups. The company's reliance on digital systems for managing contracts, invoices, and client details could have exposed vulnerabilities that threat actors exploited. The use of RDP vulnerabilities and phishing emails are common tactics that could have been employed to penetrate Myelec's systems.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.