The Medusa ransomware group has not too long ago added Alto Calore Servizi SpA to their listing of victims, claiming the Alto Calore cyber assault.
Alto Calore Servizi is an organization that manages the gathering, provide, and distribution of consuming water, in addition to sewage and purification companies in Italy. The hacker collective has said that can publish the corporate’s information in seven days if their calls for aren’t met.
Alto Calore Servizi SpA, established on March 13, 2003, is a joint-stock firm consisting of 126 shareholders, together with 125 municipalities within the province of Avellino and Benevento, in addition to the administration of the province of Avellino. The corporate is chargeable for accumulating and distributing consuming water, sewerage, and wastewater therapy.
Alto Calore cyber assault timeline
The primary string in Alto Calore cyber assault occurred on April 28, 2023 when the menace actor compromised the IT system of Alto Calore Servizi, making them briefly unusable.
Upon discovering out concerning the assault, the corporate launched a press release informing its purchasers that it’s going to not be attainable to hold out any operations or present data that requires querying the database.
Furthermore, the corporate assured that the restoration of the system will likely be communicated to the general public by press releases.
The Medusa ransomware group has given Alto Calore Servizi a deadline of seven days to satisfy their calls for, after which they are going to publish the corporate’s information.
The group has added a countdown timer on their weblog, indicating that the time left for Alto Calore Servizi to adjust to their calls for is ticking away.
Along with the deadline, the Medusa ransomware group has demanded a ransom of $10,000 to delete all the information they’ve acquired from Alto Calore Servizi’s IT system.
If the corporate fails to pay the ransom, the group has threatened to obtain the information and demand a a lot bigger ransom of $100,000.
Alto Calore cyber assault and Medusa ransomware group
The assault on Alto Calore Servizi is the newest in a string of cyberattacks on important infrastructure.
Medusa is a comparatively new ransomware group that first emerged in late 2021. The group is believed to be a Russian-speaking felony group that primarily targets massive companies and authorities entities.
Like most ransomware teams, Medusa makes use of a wide range of ways to achieve entry to its victims’ techniques. These embrace exploiting identified vulnerabilities in software, sending phishing emails with malicious attachments, or utilizing social engineering strategies to trick customers into downloading and working malware.
As soon as inside a sufferer’s community, Medusa will usually transfer laterally to achieve entry to as many techniques as attainable.
The group’s ransomware is designed to encrypt files on all contaminated machines, making them inaccessible to the sufferer. The group then calls for a ransom cost for the decryption key wanted to unlock the information.
Alto Calore cyber assault: Conclusion
Because the deadline approaches, it stays to be seen whether or not Alto Calore Servizi can pay the ransom or threat having their information revealed by the Medusa ransomware group.
The incident serves as a reminder that no group is proof against cyber assaults and highlights the necessity for fixed vigilance and preparedness.
Associated
!function(f,b,e,v,n,t,s) {if(f.fbq)return;n=f.fbq=function(){n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)}; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window, document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '5969393309772353'); fbq('track', 'PageView');
(function(c,l,a,r,i,t,y)function()[]).push(arguments); t=l.createElement(r);t.async=1;t.src="https://www.clarity.ms/tag/"+i; y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y); )(window, document, "clarity", "script", "f1dqrc05x2");