Monday, April 21, 2025
HomeCyber Security NewsNew Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS...

New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

Published on

SIEM as a Service

Follow Us on Google News

A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals (Australia) on December 12th and PUS GmbH (Germany) on December 20th. 

Morpheus offers stolen data for sale on the DLS, requiring buyers to create accounts. While a researcher suggests a link to Hellcat ransomware, there is no definitive evidence of ransomware deployment or any connection between the groups.

Morpheus DLS landing page showing Pus GmbH victim post.
Morpheus DLS landing page showing Pus GmbH victim post.

Extortion groups leverage Data Leak Sites (DLS) to escalate pressure on victims as initial threats involve public shaming by publishing the victim’s name and attack details on the group’s website. 

- Advertisement - Google News

If this fails, the group escalates by releasing proof of data theft, such as screenshots of internal files, sensitive documents, and personally identifiable information. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

A countdown timer is often introduced, implying the release of all stolen data to the public or on the DLS, either for free or a fee, upon expiration.

Cyjax observes a concerning increase in the emergence of new DLSs in recent years, highlighting the growing significance of this threat vector.

The Morpheus Dark Web Leak Site (DLS) presents a three-tiered access structure. Unregistered users can view the landing page, showcasing a list of compromised organizations, which includes victim descriptions, stolen data samples, and contact instructions for data purchases. 

Unauthenticated users can also access registration and login pages, while account creation necessitates a username, password, and CAPTCHA completion. 

Morpheus Protected Area, visible only after login.
Morpheus Protected Area, visible only after login.

The DLS offers a user-friendly night-mode toggle for improved visibility. Upon authentication, users gain access to two restricted sections: “Protected” and “Chat.” 

The “Protected” area enables users to submit requests for access to sensitive data, potentially including additional samples beyond those publicly displayed on the “Feed” page.

The “Chat” function appears to provide a direct communication channel with the group’s administrators, likely intended to facilitate negotiations regarding payment for the advertised data.

It claimed to have exfiltrated 2.5TB of sensitive data from Arrotex Pharmaceuticals, a subsidiary of DBH Global Enterprises, which followed a previously disclosed cybersecurity incident where a malicious actor gained unauthorized access to a DBG storage server on August 25, 2024. 

Morpheus claims attack against Arrotex Pharmaceuticals
Morpheus claims attack against Arrotex Pharmaceuticals

Morpheus published evidence including PII, file trees, and compliance documents, suggesting successful data theft, which includes confidential documents, recruitment records, partner information, financial data, and business plans, which could be used for extortion, competitive advantage, or other malicious purposes.

On December 20, 2024, the ransomware group Morpheus publicly claimed to have compromised PUS GmbH, a Germany-based electronics manufacturer with an estimated $5 million in revenue. 

Morpheus is alleged to have exfiltrated sensitive data, including employee PII, customer databases, and server configuration files. The group released sample data, including invoices and HTTP server configuration data, to support their claim. 

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated...

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus...

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom, targeted high-profile organizations across...

Linux 6.15-rc3 Released With Key Kernel Bug Fixes

Linus Torvalds announced the release of Linux 6.15-rc3, delivering a fresh batch of bug...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RDP and MS Office Vulnerabilities Abused by Kimusky in Targeted Intrusions

The AhnLab SEcurity intelligence Center (ASEC) has released a detailed analysis of a sophisticated...

New Obfuscation Trick Lets Attackers Evade Antivirus and EDR Tools

Researchers have unveiled a sophisticated new technique that allows attackers to bypass traditional Antivirus...

Chinese Hackers Leverage Reverse SSH Tool in New Wave of Attacks on Organizations

The Chinese hacker group known as Billbug, or Lotus Blossom, targeted high-profile organizations across...