Thursday, January 9, 2025
HomeCyber Security NewsNew Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS...

New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

Published on

A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals (Australia) on December 12th and PUS GmbH (Germany) on December 20th. 

Morpheus offers stolen data for sale on the DLS, requiring buyers to create accounts. While a researcher suggests a link to Hellcat ransomware, there is no definitive evidence of ransomware deployment or any connection between the groups.

Morpheus DLS landing page showing Pus GmbH victim post.
Morpheus DLS landing page showing Pus GmbH victim post.

Extortion groups leverage Data Leak Sites (DLS) to escalate pressure on victims as initial threats involve public shaming by publishing the victim’s name and attack details on the group’s website. 

If this fails, the group escalates by releasing proof of data theft, such as screenshots of internal files, sensitive documents, and personally identifiable information. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

A countdown timer is often introduced, implying the release of all stolen data to the public or on the DLS, either for free or a fee, upon expiration.

Cyjax observes a concerning increase in the emergence of new DLSs in recent years, highlighting the growing significance of this threat vector.

The Morpheus Dark Web Leak Site (DLS) presents a three-tiered access structure. Unregistered users can view the landing page, showcasing a list of compromised organizations, which includes victim descriptions, stolen data samples, and contact instructions for data purchases. 

Unauthenticated users can also access registration and login pages, while account creation necessitates a username, password, and CAPTCHA completion. 

Morpheus Protected Area, visible only after login.
Morpheus Protected Area, visible only after login.

The DLS offers a user-friendly night-mode toggle for improved visibility. Upon authentication, users gain access to two restricted sections: “Protected” and “Chat.” 

The “Protected” area enables users to submit requests for access to sensitive data, potentially including additional samples beyond those publicly displayed on the “Feed” page.

The “Chat” function appears to provide a direct communication channel with the group’s administrators, likely intended to facilitate negotiations regarding payment for the advertised data.

It claimed to have exfiltrated 2.5TB of sensitive data from Arrotex Pharmaceuticals, a subsidiary of DBH Global Enterprises, which followed a previously disclosed cybersecurity incident where a malicious actor gained unauthorized access to a DBG storage server on August 25, 2024. 

Morpheus claims attack against Arrotex Pharmaceuticals
Morpheus claims attack against Arrotex Pharmaceuticals

Morpheus published evidence including PII, file trees, and compliance documents, suggesting successful data theft, which includes confidential documents, recruitment records, partner information, financial data, and business plans, which could be used for extortion, competitive advantage, or other malicious purposes.

On December 20, 2024, the ransomware group Morpheus publicly claimed to have compromised PUS GmbH, a Germany-based electronics manufacturer with an estimated $5 million in revenue. 

Morpheus is alleged to have exfiltrated sensitive data, including employee PII, customer databases, and server configuration files. The group released sample data, including invoices and HTTP server configuration data, to support their claim. 

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Latest articles

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has...

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has...

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...