RagnarLocker ransomware hits EDP energy giant, asks for €10M

Posted by & filed under Ειδοποιήσεις.

Attackers using the Ragnar Locker ransomware have encrypted the systems of Portuguese multinational energy giant Energias de Portugal (EDP) and are now asking for a 1580 BTC ransom ($10.9M or €9.9M).

EDP Group is one of the largest European operators in the energy sector (gas and electricity) and the world’s 4th largest producer of wind energy.

The company is present in 19 countries and on 4 continents, it has over 11.500 employees and delivers energy to more than 11 million customers.

During the attack, the Ragnar Locker ransomware operators claim to have stolen over 10 TB of sensitive company files and they are now threatening the company to leak all the stolen data unless the ransom is paid.

“We had downloaded more than 10TB of private information from EDP group servers,” a new post on Ragnarok’s leak site says.

“Below just a couple of files and screenshots from your network only as a proof of possession! At this moment current post is a temporary, but it could become a permanent page and also we will publish this Leak in Huge and famous journals and blogs, also we will notify all your clients, partners and competitors. So it’s depend on you make it confidential or public !”

Among the already leaked files published as a sign of what’s to come, the attackers included an edpradmin2.kdb file which is a KeePass password manager database.

When clicked on the leak site, the link leads to a database export including EDP employees’ login names, passwords, accounts, URLs, and notes.

The Ragnar Locker ransomware sample used in this attack was found by MalwareHunterTeam and BleepingComputer was able to also find the ransom note and the Tor payment page where the attackers detail the decryption process and the ransom amount.

According to the ransom note dropped on the EDP encrypted systems, the attackers were able to steal confidential information on billing, contracts, transactions, clients, and partners.

“And be assure that if you wouldn’t pay, all files and documents would be publicated for everyones view and also we would notify all your clients and partners about this leakage with direct links,” the ransom note reads.

“So if you want to avoid such harm for your reputation, better pay the amount that we asking for.”

EDP taunted in the live chat room

‏As also seen BleepingComputer, the Ragnar Locker operators also taunted EDP in a live chat “client room” used by the attackers to communicate with their victims, asking them to “check the article about your company” on the data leak site and if the company is “ready to see your private information, at the breaking need, tech-blogs, and stockmarket sites.”

They also add “timer is not waiting” and EDP is also warned not to attempt to decrypt their data using any other software besides the decryption tool provided by the Ragnar Locker operators as they risk damaging or losing it.

The attackers also offer EDP a special price if they reach out within two days of their systems having been encrypted, however, they are also warned that they will have to wait for their turn as the ransomware’s live chat is not online 24/7.

BleepingComputer has reached out to EDP for comment and additional details but had not heard back at the time of this publication. This article will be updated when a response is received.

Delivered via MSP enterprise support tools

Ragnar Locker ransomware was first spotted while being used as part of attacks against compromised networks towards the end of December 2019.

The Ragnar Locker operators target software regularly used by managed service providers to prevent their attack from being detected and blocked.

Kyle Hanslovan, the CEO of MSP security firm Huntress Labs, told BleepingComputer in February of his company seeing Ragnar Locker being deployed via the MSP software ConnectWise.

After reconnaissance and pre-deployment stages, the attackers drop a highly targeted ransomware executable that adds specific extension to encrypted files, features an embedded RSA-2048 key, and drops custom ransom notes.

The ransom notes include the victim’s company name, a link to the Tor site, and the data leak site with the victim’s published data.

BleepingComputer has previously seen multiple ransom notes for Ragnar Locker with ransoms ranging from $200,000 to roughly $600,000.

 

The information contained in this website is for general information purposes only. The information is gathered from Bleeping Computer, while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk.  Through this website, you are able to link to other websites which are not under the control of CSIRT-CY. We have no control over the nature, content and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them. Every effort is made to keep the website up and running smoothly. However, CSIRT-CY takes no responsibility for, and will not be liable for, the website being temporarily unavailable due to technical issues beyond our control.