The Ragnar Locker ransomware gang has attacked Citizen Systems Europe. Citizen Systems Europe is a prominent company specializing in printing and imaging solutions. As a subsidiary of Citizen Systems Japan Co., Ltd., it serves as the European headquarters for the Citizen group's printer business. With its base in the United Kingdom, Citizen Systems Europe plays a pivotal role in managing and expanding the company's operations across Europe. Their focus is on delivering innovative printing solutions to cater to various industries and customer needs throughout the European market. Ragnar Locker posted Citizen Systems Europe to its data leak site on September 14th but provided no further details. RagnarLocker is not a traditional RaaS. They first emerged in December of 2019 and were assessed to be related to or working in cooperation with Maze and MountLocker operators. RagnarLocker typically compromises victim networks through vulnerable Remote Desktop Protocol (RDP) software, a common ransomware technique. RagnarLocker was increasingly active in 2022, but attack volume has dripped off significantly in Q1-2023. RagnarLocker ransom demands vary and have been observed to exceed $10 million. Ragnar Locker has both Windows and Linux versions that actively detect and bypass security tools on the targeted network, as well as scanning for virtual-based machines, and any remote management solutions. IT encrypts with a custom Salsa20 algorithm and has been observed terminating services that managed service providers (MSPs) to remotely protect and manage customer networks. RagnarLocker is opportunistic and is assessed to target based on a victim’s ability to pay large ransom demands, focusing on the manufacturing, energy, financial services, government, and information technology sectors. RagnarLocker engages in data exfiltration for double extortion and maintains a leaks site called “Wall of Shame.” RagnarLocker will delete VSS Shadow Copies to thwart encryption rollback.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.