Schuette Metals Ransomware Attack: Cactus Group

Incident Date:

May 20, 2024

World map

Overview

Title

Schuette Metals Ransomware Attack: Cactus Group

Victim

schuette metals

Attacker

Cactus

Location

Rothschild, USA

Wisconsin, USA

First Reported

May 20, 2024

Schuette Metals Ransomware Attack by Cactus Group

Company Overview

Schuette Metals, a leading metal fabrication company based in Rothschild, Wisconsin, specializing in custom metal fabrication, welding, and machining services. They cater to various industries such as architectural, agricultural, construction, defense, and industrial sectors. With a history dating back to 1957, Schuette Metals has established a reputation for providing high-quality products and services.

Company Size and Standout

With approximately 137 employees and a revenue of $28.9 million, Schuette Metals stands out in the metal fabrication industry for its unique services, particularly in the agricultural and defense sectors. The company's Quick Response Manufacturing (QRM) process has enabled them to reduce costs and lead times for their customers.

Ransomware Attack Overview

Schuette Metals fell victim to a ransomware attack by the Cactus group, a sophisticated threat actor known for its double-extortion tactics. The attackers managed to exfiltrate 280 GB of data from the company's systems, although the specific type of data has not been disclosed. This breach signifies a significant security incident for Schuette Metals.

Cactus Ransomware Group

The Cactus ransomware group is a relatively new but highly skilled threat actor that has been active since March 2023. Known for exploiting vulnerabilities in VPN appliances and Qlik Sense software, conducting phishing attacks, and partnering with malware distributors, Cactus employs advanced encryption techniques to evade detection.

Attack Details

Cactus gained unauthorized access to Schuette Metals' systems by exploiting VPN vulnerabilities and establishing an SSH backdoor for persistence. The group utilized AES-256-GCM and RSA-4096 encryption algorithms to encrypt files, threatening to leak the stolen data on their dark web portal if the ransom was not paid. This attack highlights the importance of robust cybersecurity measures to protect against evolving ransomware threats.

Sources:

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.