Slash Boxes

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by martyb on Monday October 19 2020, @10:33AM   Printer-friendly
from the it's-time-to-stop-horsing-around-and-time-to-clip-Clop dept.

Enterprise Solutions Provider 'Software AG' Hit by Clop Ransomware:

German enterprise solutions giant Software AG revealed last week that it had been targeted by cybercriminals with the Clop ransomware.

[...] The company said its helpdesk services and internal communications were impacted, but claimed that cloud-based services were not affected and that it found no evidence of customer information being compromised.

However, in an update shared on October 8, the company said the malware had not been fully contained and it had found evidence that the attackers did in fact download data from servers and employee notebooks.

Researchers at MalwareHunterTeam said on Saturday that the attack involved the Clop ransomware, and they noticed what appeared to be a new feature — the use of wevtutil.exe to clear event logs. They also noted that the sample that hit Software AG checked for the presence of McAfee software and attempted to uninstall it, but it's unclear if the attackers somehow learned that the target was using McAfee products or if this functionality was added to the malware for a different target.

[...] Screenshots posted by the hackers show that they have obtained tens of gigabytes of data representing more than one million files. They appear to have obtained passport copies, invoices, and emails.

Bleeping Computer has learned from the Clop payment page associated with Software AG that the attackers have asked for more than 2,000 bitcoin, which is roughly $23 million.

(Emphasis retained from original.)

Original Submission

This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Monday October 19 2020, @01:51PM

    by Anonymous Coward on Monday October 19 2020, @01:51PM (#1066410)

    Stop paying. Hold payers accountable for making things worse. Especially cyber security insurance companies.

    TLA's likely know who is doing this, but think too highly of their methods to fix this.

    Hold Microsoft accountable of unconscionable priorities, putting the newest marketing goals ahead of fixing things the last goals broke.


    Or, just do old fashioned, offsite, offline backups?