Cyber Security News

New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which has stolen data from Arrotex Pharmaceuticals (Australia) on December 12th and PUS GmbH (Germany) on December 20th. 

Morpheus offers stolen data for sale on the DLS, requiring buyers to create accounts. While a researcher suggests a link to Hellcat ransomware, there is no definitive evidence of ransomware deployment or any connection between the groups.

Morpheus DLS landing page showing Pus GmbH victim post.

Extortion groups leverage Data Leak Sites (DLS) to escalate pressure on victims as initial threats involve public shaming by publishing the victim’s name and attack details on the group’s website. 

If this fails, the group escalates by releasing proof of data theft, such as screenshots of internal files, sensitive documents, and personally identifiable information. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

A countdown timer is often introduced, implying the release of all stolen data to the public or on the DLS, either for free or a fee, upon expiration.

Cyjax observes a concerning increase in the emergence of new DLSs in recent years, highlighting the growing significance of this threat vector.

The Morpheus Dark Web Leak Site (DLS) presents a three-tiered access structure. Unregistered users can view the landing page, showcasing a list of compromised organizations, which includes victim descriptions, stolen data samples, and contact instructions for data purchases. 

Unauthenticated users can also access registration and login pages, while account creation necessitates a username, password, and CAPTCHA completion. 

Morpheus Protected Area, visible only after login.

The DLS offers a user-friendly night-mode toggle for improved visibility. Upon authentication, users gain access to two restricted sections: “Protected” and “Chat.” 

The “Protected” area enables users to submit requests for access to sensitive data, potentially including additional samples beyond those publicly displayed on the “Feed” page.

The “Chat” function appears to provide a direct communication channel with the group’s administrators, likely intended to facilitate negotiations regarding payment for the advertised data.

It claimed to have exfiltrated 2.5TB of sensitive data from Arrotex Pharmaceuticals, a subsidiary of DBH Global Enterprises, which followed a previously disclosed cybersecurity incident where a malicious actor gained unauthorized access to a DBG storage server on August 25, 2024. 

Morpheus claims attack against Arrotex Pharmaceuticals

Morpheus published evidence including PII, file trees, and compliance documents, suggesting successful data theft, which includes confidential documents, recruitment records, partner information, financial data, and business plans, which could be used for extortion, competitive advantage, or other malicious purposes.

On December 20, 2024, the ransomware group Morpheus publicly claimed to have compromised PUS GmbH, a Germany-based electronics manufacturer with an estimated $5 million in revenue. 

Morpheus is alleged to have exfiltrated sensitive data, including employee PII, customer databases, and server configuration files. The group released sample data, including invoices and HTTP server configuration data, to support their claim. 

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra

Recent Posts

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched…

2 hours ago

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to trick…

5 hours ago

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in a…

6 hours ago

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows trojans…

8 hours ago

Green Bay Packers Store Hacked – Thousands of Credit Cards Data Stolen

The Green Bay Packers, Inc. has confirmed that its online merchandise store was hacked, leading…

8 hours ago

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is the…

8 hours ago