Ransomware Hits Glacier Transit & Storage by Hunters International

Incident Date:

October 10, 2024

World map

Overview

Title

Ransomware Hits Glacier Transit & Storage by Hunters International

Victim

Glacier Transit & Storage

Attacker

Hunters International

Location

Plymouth, USA

Wisconsin, USA

First Reported

October 10, 2024

Ransomware Attack on Glacier Transit & Storage by Hunters International

Glacier Transit & Storage (GTS), a family-owned logistics company based in Plymouth, Wisconsin, has fallen victim to a ransomware attack orchestrated by the cybercriminal group Hunters International. Established in 1955, GTS specializes in warehousing, distribution, and transportation services, with a significant focus on temperature-sensitive storage solutions. The company operates a substantial warehousing capacity, including 13 million cubic feet of refrigerated space and 250,000 square feet of ambient storage, catering primarily to the dairy and food sectors.

GTS is recognized for its commitment to customer service and operational excellence, maintaining an asset-based fleet certified by SmartWay for environmentally friendly logistics solutions. The company also offers specialized services such as inventory financing, cross-docking, and customized packaging, which have earned it a reputation for reliability and professionalism in the logistics industry.

Despite its strengths, GTS's reliance on digital systems for inventory management and logistics operations may have made it vulnerable to cyber threats. Hunters International, a Ransomware-as-a-Service (RaaS) group, has claimed responsibility for the attack, asserting that they have exfiltrated approximately 12 GB of sensitive organizational data from GTS's systems. This breach highlights the potential risks faced by companies in the logistics sector, where disruption can have significant operational and financial impacts.

Hunters International emerged in October 2023, leveraging code from the defunct Hive ransomware group. The group is known for its sophisticated double extortion tactics, which involve encrypting files and threatening to publish stolen data unless a ransom is paid. Their malware, developed in Rust, is designed for cross-platform targeting, making it adaptable to various enterprise environments.

The attack on GTS likely involved initial access through phishing campaigns or exploitation of remote services, followed by lateral movement within the network to exfiltrate data. Hunters International's ability to bypass advanced security measures and their use of custom malware like SharpRhino underscore the group's technical sophistication and the challenges faced by organizations in defending against such threats.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.