OSG USA Hit by Meow Ransomware Exposing Manufacturing Risks

Incident Date:

October 12, 2024

World map

Overview

Title

OSG USA Hit by Meow Ransomware Exposing Manufacturing Risks

Victim

OSG USA, INC

Attacker

Meow

Location

Parma, USA

Ohio, USA

First Reported

October 12, 2024

Ransomware Attack on OSG USA, Inc. by Meow Ransomware Group

OSG USA, Inc., a leading manufacturer in the cutting tool industry, has fallen victim to a ransomware attack orchestrated by the Meow Ransomware Group. This incident highlights the ongoing threat that ransomware poses to the manufacturing sector, which is often targeted due to its valuable intellectual property and operational data.

Company Profile: OSG USA, Inc.

OSG USA, Inc. is a prominent player in the manufacturing sector, specializing in high-technology cutting tools such as taps, drills, end mills, and indexable tools. As a subsidiary of the global OSG Corporation, the company is known for its innovative solutions that enhance machining efficiency and precision across various industries, including automotive, aerospace, and medical device manufacturing. With a workforce of over 1,000 employees, OSG USA operates multiple locations, including distribution centers in Illinois and California, supporting its logistics and service capabilities.

Details of the Ransomware Attack

The Meow Ransomware Group claims to have infiltrated OSG USA's systems, exfiltrating over 25 GB of sensitive data. This breach underscores the vulnerabilities within the manufacturing sector, where companies like OSG USA hold critical data that can be exploited by cybercriminals. The attack serves as a stark reminder of the importance of effective cybersecurity measures to protect against unauthorized access and data theft.

Profile of the Meow Ransomware Group

Emerging in late 2022, the Meow Ransomware Group is associated with the Conti v2 ransomware variant. Known for targeting industries with sensitive data, the group employs various infection methods, including phishing emails and exploiting Remote Desktop Protocol vulnerabilities. Meow Ransomware encrypts files using a combination of the ChaCha20 and RSA-4096 algorithms, leaving behind a ransom note instructing victims to contact them for decryption. The group has been particularly active in the United States, with a focus on sectors like healthcare and manufacturing.

Potential Vulnerabilities and Penetration Methods

Manufacturing companies like OSG USA are attractive targets for ransomware groups due to their reliance on proprietary technologies and sensitive operational data. The Meow Ransomware Group likely exploited vulnerabilities in OSG USA's cybersecurity infrastructure, potentially through phishing attacks or exploiting unpatched software vulnerabilities. This incident highlights the critical need for continuous monitoring and updating of cybersecurity protocols to safeguard against such threats.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.