Cyber Security News

Hellcat Ransomware Attacking Government Organizations & Educational Institutions

A new ransomware gang, Hellcat, emerged on dark web forums in 2024, targeting critical infrastructure, government organizations, educational institutions, and the energy sector.

Operating on a ransomware-as-a-service (RaaS) model, Hellcat offers ransomware tools and infrastructure to affiliates in exchange for a profit share.

The group relies on double extortion techniques, combining data theft with system encryption to maximize victim compliance.

This approach also integrates psychological tactics such as humiliation and public pressure, emphasizing the group’s notable sophistication.

A Surge of Attacks

Hellcat’s activity surged in late 2024, with three attacks reported on November 14 alone.

On November 2, Hellcat infiltrated Schneider Electric SE, a French energy company.

Schneider Electric SE ransom demand

The attackers exploited vulnerabilities in the company’s Jira project management system, exfiltrating more than 40GB of sensitive data, including 75,000 email addresses and rows of customer information.

The gang demanded $125,000 in cryptocurrency labeled as “Baguettes,” mocking the company’s French roots.

On November 4, Hellcat targeted Tanzania’s College of Business Education, leaking over 500,000 records of students, faculty, and staff.

The attack was carried out in collaboration with “Hikkl-Chan,” a threat actor previously implicated in major data breaches.

Days later, Hellcat shifted focus to a prominent U.S. university on November 14.

Offering root access to the university’s server on dark web forums for $1,500, the group threatened access to student records, financial systems, and critical operational data.

Continued Escalation

December attacks showcased Hellcat’s growing ambitions. The group targeted a French energy distribution company and an Iraqi city government on the same day, December 1.

Sale of root access for Iraq city government

Hellcat advertised root access to the French company’s servers, valued at $7 billion in annual revenue, for $500.

Similarly, root access to Iraqi government servers, critical for public services, was sold for $300.

This attack followed a pattern of targeting Iraq’s digital infrastructure, including a supply chain breach earlier in the year that exposed 21.58GB of voter data.

Hellcat employs advanced TTPs to exploit zero-day vulnerabilities in enterprise tools such as Jira in the Schneider Electric SE attack and escalate privileges to admin or root levels.

They target firewalls and critical infrastructure, further amplifying the scale of damage.

The group’s double extortion strategy compromises sensitive data before encryption, ensuring maximum leverage over victims.

Hellcat’s emergence underscores a troubling shift in the ransomware landscape.

By operationalizing RaaS and psychological coercion, the group has broadened the scope and impact of ransomware attacks.

Their focus on high-value sectors including education, government, and energy highlights the urgency for stronger cybersecurity measures.

Organizations must adopt proactive solutions like Cato SASE Cloud to disrupt the ransomware attack chain and mitigate emerging threats from sophisticated actors like Hellcat.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has been…

38 minutes ago

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and…

44 minutes ago

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its Windows…

54 minutes ago

Tria Stealer Malware Exploits Android Devices to Harvest SMS Data

Cybersecurity researchers have uncovered a sophisticated Android malware campaign known as "Tria Stealer," which is…

2 hours ago

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web

A new wave of cybercrime is surfacing as hackers exploit compromised emails and digital advertising…

3 hours ago

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government…

4 hours ago