Article Details

Scrape Timestamp (UTC): 2024-11-22 08:40:29.957

Source: https://www.theregister.com/2024/11/22/safepay_microlise/

Original Article Text

Click to Toggle View

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking. Fledgling band of crooks says it stole 1.2 TB of data. The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion demands before leaking data. SafePay claims to have stolen 1.2 TB. Microlise, which offers vehicle tracking services and more to the likes of DHL and Serco – both of which were confirmed as collateral damage in Microlise's incident – told The Register that some of its data was stolen earlier this month. We contacted the company for a response and confirmation that ransomware was involved in the incident, which until now has only been described as a "cyber incident," but it didn't immediately respond. Microlise has issued two separate disclosures, the first of which came on October 31, saying it was making "substantial progress in containing and clearing the threat from its network." Major customers reported issues soon after, including delivery giant DHL, which was unable to track its lorries, affecting deliveries to UK convenience stores operated by Nisa Group. British security company Serco, which manages numerous public sector contracts, including with the Ministry of Justice, was also hit. The company reported panic alarms and tracking systems used by prisoner transport vans were temporarily disabled, although service continued without disruption. No individuals in custody were unaccounted for. Experts speaking to The Register at the time said the wording used by Microlise in its disclosure, coupled with the reports of disruptions by customers, suggested ransomware was indeed involved, although it wasn't confirmed explicitly. A more recent update on the attack, which Microlise told the London Stock Exchange would be its final one concerning the matter, said some customers' systems remained offline, while many others had been restored. "The company can now confirm that the vast majority of customer systems are back online, with some remaining customers conducting their own security verifications before enabling users," a statement read. "The company would like to reiterate no customer systems data was compromised." Microlise went on to say that it was "continuing to assess the impact of the incident," but didn't foresee it having a material impact on its yearly financials. "Once again, Microlise would like to thank customers for their patience and understanding over this challenging period," it added. Not so safe to pay SafePay is a new group on the scene. By the time researchers at Huntress got around to looking at it in October, it only had 22 victims logged on its leak blog. Huntress's report on the group contains all the technical details and indicators of compromise needed for defenders to add to their detection rules. However, in the two incidents the researchers investigated, SafePay used valid credentials to access victims' environments. They didn't establish persistence through the creation of new user accounts or by any other means either. The first incident Huntress looked at involved the crims accessing an endpoint via RDP and disabling Windows Defender using the exact same sequence of LOLBin commands as previously seen during INC Ransomware attacks. On day two of the attack, SafePay's cronies encrypted the victim's files within 15 minutes after stealing data the day before. Given how new the group is to the cybercrime landscape, there is very little open source information about it or who's involved, although if its claim to the Microlise attack is genuine, it's quite the scalp to hold as it bursts onto the ransomware scene.

Daily Brief Summary

CYBERCRIME // Ransomware Attack on Microlise Disrupts Tracking, Data Stolen

SafePay ransomware gang claimed responsibility for an attack on UK-based Microlise, threatening to leak stolen data unless their demands were met within 24 hours.

Approximately 1.2 TB of data was reportedly stolen by SafePay from Microlise, which provides vehicle tracking for companies including DHL and Serco.

The attack caused significant disruptions for major customers; DHL experienced issues tracking lorries, while Serco reported disabled panic alarms in prisoner transport vans.

Microlise has made public disclosures, indicating substantial progress in mitigating the threat and restoring customer systems, although some systems remained offline for security verifications.

Experts suggested the possibility of a ransomware attack based on disruptions and company statements, even though Microlise did not confirm ransomware explicitly.

SafePay is relatively new to the cybercrime scene, with limited victims and minimal information available about its operations or members.

The attack on Microlise, given its scale and impact on critical logistics and public safety operations, marks a significant operation by the fledgling SafePay group.