RansomHouse Ransomware Breaches Telecom Giant, Exfiltrating 2TB of Data

The frequency of ransomware attacks has intensified in recent months, driven primarily by cybercriminals employing increasingly aggressive tactics such as double and triple extortion. These strategies compel victims not only to pay a ransom to regain system access but also to prevent the public disclosure of sensitive stolen data.

A notable incident involves Cell C, South Africa’s fourth-largest mobile network operator, which has publicly acknowledged suffering a ransomware attack that resulted in a considerable theft of data.

Cell C stated that the attack was executed by RansomHouse, a relatively new group in the cybercrime landscape known for deploying file-encrypting malware. Reports suggest that the attackers managed to exfiltrate approximately 2TB of data, including sensitive information from around 7.7 million customers.

Although specific details regarding the breach are still emerging, a source within the company, who spoke on condition of anonymity, indicated that the compromised information encompasses a range of sensitive customer data. This includes full names, contact details, identification numbers, banking information, driving license details, medical records, and passport information.

Interestingly, questions arise as to why a telecommunications provider would maintain medical records, as the relevance to its core operations is ambiguous. The potential misuse of this stolen data could lead to diverse malicious activities, such as identity theft and phishing attacks.

In reaction to this incident, Cell C has initiated measures to mitigate the repercussions of the breach, engaging international cybersecurity experts to rectify the situation and operationally counter the actions of RansomHouse with precision.

RansomHouse, active since March 2022, appears to specialize more in the exfiltration of data rather than the traditional method of encrypting victim databases. The group claims to expose vulnerabilities within corporate IT systems while simultaneously demanding substantial ransoms—a contradiction of its purported mission as a self-described “Force for Good”.

In analyzing this attack through the MITRE ATT&CK framework, tactics potentially employed include initial access via methods such as phishing or exploiting unpatched software, alongside persistence mechanisms and privilege escalation techniques to navigate the compromised system successfully. The evolving nature of these attacks necessitates that organizations sharpen their focus on robust cybersecurity measures to defend against such threats.

The ongoing dialogue in the cybersecurity realm about reinforcing defenses underscores the importance of continual adaptation to emerging threats, making it crucial for businesses to remain vigilant and proactive in their cybersecurity strategies.

Ad

Join our LinkedIn group Information Security Community!

Source