Tuesday, March 4, 2025
Homecyber securityHellcat Ransomware Attacking Government Organizations & Educational Institutions

Hellcat Ransomware Attacking Government Organizations & Educational Institutions

Published on

SIEM as a Service

Follow Us on Google News

A new ransomware gang, Hellcat, emerged on dark web forums in 2024, targeting critical infrastructure, government organizations, educational institutions, and the energy sector.

Operating on a ransomware-as-a-service (RaaS) model, Hellcat offers ransomware tools and infrastructure to affiliates in exchange for a profit share.

The group relies on double extortion techniques, combining data theft with system encryption to maximize victim compliance.

This approach also integrates psychological tactics such as humiliation and public pressure, emphasizing the group’s notable sophistication.

A Surge of Attacks

Hellcat’s activity surged in late 2024, with three attacks reported on November 14 alone.

On November 2, Hellcat infiltrated Schneider Electric SE, a French energy company.

Hellcat ransomware
Schneider Electric SE ransom demand

The attackers exploited vulnerabilities in the company’s Jira project management system, exfiltrating more than 40GB of sensitive data, including 75,000 email addresses and rows of customer information.

The gang demanded $125,000 in cryptocurrency labeled as “Baguettes,” mocking the company’s French roots.

On November 4, Hellcat targeted Tanzania’s College of Business Education, leaking over 500,000 records of students, faculty, and staff.

The attack was carried out in collaboration with “Hikkl-Chan,” a threat actor previously implicated in major data breaches.

Days later, Hellcat shifted focus to a prominent U.S. university on November 14.

Offering root access to the university’s server on dark web forums for $1,500, the group threatened access to student records, financial systems, and critical operational data.

Continued Escalation

December attacks showcased Hellcat’s growing ambitions. The group targeted a French energy distribution company and an Iraqi city government on the same day, December 1.

Hellcat ransomware
Sale of root access for Iraq city government

Hellcat advertised root access to the French company’s servers, valued at $7 billion in annual revenue, for $500.

Similarly, root access to Iraqi government servers, critical for public services, was sold for $300.

This attack followed a pattern of targeting Iraq’s digital infrastructure, including a supply chain breach earlier in the year that exposed 21.58GB of voter data.

Hellcat employs advanced TTPs to exploit zero-day vulnerabilities in enterprise tools such as Jira in the Schneider Electric SE attack and escalate privileges to admin or root levels.

They target firewalls and critical infrastructure, further amplifying the scale of damage.

The group’s double extortion strategy compromises sensitive data before encryption, ensuring maximum leverage over victims.

Hellcat’s emergence underscores a troubling shift in the ransomware landscape.

By operationalizing RaaS and psychological coercion, the group has broadened the scope and impact of ransomware attacks.

Their focus on high-value sectors including education, government, and energy highlights the urgency for stronger cybersecurity measures.

Organizations must adopt proactive solutions like Cato SASE Cloud to disrupt the ransomware attack chain and mitigate emerging threats from sophisticated actors like Hellcat.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...