Ransomware Attack on Optimize EGS Exposes 11GB of Sensitive Data

Incident Date:

August 26, 2024

World map

Overview

Title

Ransomware Attack on Optimize EGS Exposes 11GB of Sensitive Data

Victim

Optimize EGS

Attacker

Meow

Location

Scott, USA

Louisiana, USA

First Reported

August 26, 2024

Ransomware Attack on Optimize EGS by Meow Ransomware Group

Optimize EGS, a leading provider of Generac home standby generators in southern Louisiana, has recently fallen victim to a ransomware attack orchestrated by the notorious Meow ransomware group. The attack has resulted in the exfiltration of over 11 GB of sensitive data, which the attackers are now offering for sale on their dark web leak site.

About Optimize EGS

Established in 2010, Optimize EGS, also known as Optimize Generator People, has rapidly grown to become one of the largest full-service Generac dealerships in North America. The company operates multiple locations across Louisiana, including Baton Rouge, Lafayette, Mandeville, and Kenner, serving a wide area along the I10/I12 corridor from Lake Charles to Slidell. Recognized as a top five dealer by Generac in 2023, Optimize EGS is dedicated to providing reliable backup power solutions, particularly in a region prone to power outages due to natural disasters like hurricanes.

Optimize EGS offers a comprehensive range of services, including the sale, installation, maintenance, and repair of Generac generators. Their customer-centric approach emphasizes education during the sales process, ensuring clients make informed decisions regarding their power generation needs. The company also provides flexible financing options and long-term warranties, reflecting their commitment to customer service.

Details of the Ransomware Attack

The Meow ransomware group has claimed responsibility for the attack on Optimize EGS, exfiltrating a significant amount of sensitive data. The stolen data includes employee records, client information, scanned payment documents, personal data such as dates of birth, driver's license scans, and social security numbers, as well as generator installation blueprints and technical drawings. The attackers are demanding $16,000 for access to this comprehensive dataset, promising a smooth and confidential transaction process.

About Meow Ransomware Group

Meow Ransomware emerged in late 2022 and has been associated with the Conti v2 ransomware variant. The group resurfaced in late 2023 and has been highly active, primarily targeting victims in the United States. Meow Ransomware employs various infection methods, including phishing emails, exploit kits, Remote Desktop Protocol (RDP) vulnerabilities, and malvertising. Once a system is compromised, the ransomware encrypts files using a combination of the ChaCha20 and RSA-4096 algorithms.

Vulnerabilities and Penetration

Optimize EGS's extensive operations and the sensitive nature of the data they handle made them a prime target for ransomware attacks. The company's reliance on digital records for employee and client information, as well as technical documents, likely provided multiple entry points for the attackers. The use of phishing emails and RDP vulnerabilities are common methods employed by ransomware groups like Meow to penetrate company systems.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.