The RA Group ransomware gang has attacked Bluelinea. Bluelinea is a remote assistance device manufacturer headquartered in Versailles, France. RA Group posted Bluelinea to its data leak site on July 29th, leaking 3519MB of stolen data belonging to 216,914 customers. The data includes but is not limited to names, addresses, emails, physical conditions, and emergency contacts. Researchers first identified the RA Group on April 22nd, 2023, when it launched its data leak site. RA Group uses an encryptor based on Babuk's (another ransomware gang) leaked source code. The group primarily targets US manufacturing, pharmaceutical, insurance, and wealth management firms. RA Group uses double extortion tactics. The distinctive trait of the RA Group involves crafting a unique ransom note tailored for the specific organization under attack, and the malware's executable file is also named after the victim. The ransomware targets all logical drives on the victim's computer and network shares, seeking to encrypt specific folders. Notably, directories linked to the Windows system, boot files, Program Files, and similar components are excluded from encryption. This strategy is employed to prevent rendering the victim's system completely unusable, thereby reducing the likelihood of receiving a ransom payment. The encryptor used by the RA Group employs intermittent encryption. This method alternates between encrypting and not encrypting segments of a file, which accelerates the encryption process. However, this approach carries risks as it permits partial data recovery from files. The encryptor utilizes curve25519 and eSTREAM cipher hc-128 algorithms. The files that undergo encryption have the ".GAGUP" extension added to their filenames. Furthermore, any volume shadow copies and contents in the Recycle Bin are purged to hinder data restoration.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.