{"id":16614,"date":"2020-11-07T22:00:16","date_gmt":"2020-11-07T21:00:16","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16614"},"modified":"2020-11-17T07:10:47","modified_gmt":"2020-11-17T06:10:47","slug":"ragnar-locker-ransomware-infektion-bei-campari","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/11\/07\/ragnar-locker-ransomware-infektion-bei-campari\/","title":{"rendered":"Ragnar Locker Ransomware Infection at Campari Group"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/11\/07\/ragnar-locker-ransomware-infektion-bei-campari\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]The Italian spirits producer Campari Group has fallen victim to a Ragnar Locker ransomware infection. Some systems of the Campari Group had to be restored after the files were encrypted. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg06.met.vgwort.de\/na\/77f5edcf857f4df9b13f7abb22d76a87\" width=\"1\" height=\"1\">ZDnet.com and Bleeping Computer reported this already on Thursday in <a href=\"https:\/\/www.zdnet.com\/article\/italian-beverage-vendor-campari-knocked-offline-after-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">this<\/a> and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/campari-hit-by-ragnar-locker-ransomware-15-million-demanded\/\" target=\"_blank\" rel=\"noopener noreferrer\">this<\/a> article. The cyber criminals demanded 15 million US dollars ransom, but the Campari Group did not respond to the blackmail. <\/p>\n<p><img decoding=\"async\" title=\"Ragnar Locker Ransomware-Infektion bei Campari\" alt=\"Ragnar Locker Ransomware-Infektion bei Campari\" src=\"https:\/\/i.imgur.com\/FZdmTfy.jpg\"><\/p>\n<p>The attack must have taken place around November 1, 2020, on the IT systems of the Italian beverage company Campari. On Friday, November 5, 2020, Campari confirmed that data on some of the company's servers had been encrypted and some information had been lost. This was revealed by checks carried out after a cyber attack. Here is the Italian statement (<a href=\"https:\/\/web.archive.org\/web\/20201110153223\/https:\/\/ftaonline.com\/news\/campari-group-vittima-di-un-attacco-malware\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a>):<\/p>\n<blockquote>\n<p>Campari Group informa che, presumibilmente il giorno 1\u00b0 novembre 2020, \u00e8 stato oggetto di un attacco malware (virus informatico), che \u00e8 stato prontamente identificato. Il dipartimento IT del Gruppo, con il supporto di esperti di sicurezza informatica, ha immediatamente intrapreso azioni volte a limitare la diffusione del malware nei dati e sistemi. Pertanto, la societ\u00e0 ha attuato una temporanea sospensione dei servizi IT, in quanto alcuni sistemi sono stati isolati al fine di consentirne la sanificazione e il progressivo riavvio in condizioni di sicurezza per un tempestivo ripristino dell'ordinaria operativit\u00e0. Contestualmente \u00e8 stata avviata un'indagine sull'attacco, che \u00e8 tutt'ora in corso. Si ritiene che dalla temporanea sospensione dei sistemi IT non possa derivare alcun significativo impatto sui risultati del Gruppo. Nel frattempo, Campari Group ha prontamente avviato una piena collaborazione con le autorit\u00e0 competenti.<\/p>\n<\/blockquote>\n<p>The Campari Group informs in the statement above, that, presumably on November 1, 2020, it was subject to a malware attack (computer virus), which was promptly identified. The IT department of the Group, with the support of IT security experts, immediately took action to limit the spread of malware in data and systems. Therefore, the company implemented a temporary suspension of IT services, as some systems were isolated in order to allow their sanitization and progressive restart in safe conditions for a timely return to normal operations. <\/p>\n<p>At the same time, an investigation into the attack was launched, which is still ongoing. It is believed that the temporary suspension of IT systems cannot have any significant impact on the Group's results. In the meantime, Campari Group has promptly initiated full cooperation with the competent authorities. ZDnet and Bleeping Computer write that the Ragnar Locker gang demanded a $15 million ransom. This also emerges from published screenshots. But no ransom was paid and the Campari group is trying to clean up the systems this way. <\/p>\n<p>Threadpost has further details in <a href=\"https:\/\/threatpost.com\/campari-site-ransomware-hangover\/161029\/\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a>. Malware <a href=\"https:\/\/twitter.com\/pancak3lullz\" target=\"_blank\" rel=\"noopener noreferrer\">researcher Pancak3<\/a> shared a copy of the ransom note with Threatpost, that says:<\/p>\n<blockquote>\n<p>We have BREACHED your security perimeter and get [sic] access to every server of the company's network in different countries across all your international offices.<\/p>\n<\/blockquote>\n<p>Threadpost writes, that the note goes on to detail the types of data compromised, including accounting files, bank statements, employee personal information and more. The note said the scammers were able to steal a total of 2TB of data.The cyber criminals wrote: <\/p>\n<blockquote>\n<p>If no offer is made than [sic] all your info with be posted and\/or offered through an auction to any 3rd get-togethers.<\/p>\n<\/blockquote>\n<p>ZDNet wrote, that compromised documents posted on a leak site of the group provided a contract involving Wild Turkey and actor Matthew McConaughey. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The Italian spirits producer Campari Group has fallen victim to a Ragnar Locker ransomware infection. Some systems of the Campari Group had to be restored after the files were encrypted.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-16614","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16614"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16614\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}