Wednesday, February 26, 2025
HomeSecurity NewsRansomware Attack Hits Ukraine’s Ministry of Energy Website and Demands Ransom of...

Ransomware Attack Hits Ukraine’s Ministry of Energy Website and Demands Ransom of 0.1 Bitcoin

Published on

SIEM as a Service

Follow Us on Google News

Hackers compromised the official website of Ukraine Energy Ministry and demanding a ransom of 0.1 in BTC that worths $927.86. It appears like the threat actors exploit the recently patched highly critical remote code execution vulnerability affecting most Drupal sites.

Threat actors continuously targeting Ukraine critical infrastructure and government networks over recent years and the ransomware attacker possibly did in a financial motivation.

Checking with the cached version of the affected site, it looks the site were running Drupal 7, which is currently under active attack with Drupalgeddon2 exploits.

According to AlienVault researchers, the website the was initially defaced by the hacker with online handle “X-Zakaria” meanwhile the second hacker arrived with ransomware and encrypted files and added a ransom note.

“What has probably happened here is that a hacktivist has hacked the site for fun, then the criminal ransomware attacker has used their backdoor, which you can see at the bottom of the page, to try and make some money,” AlienVault security researcher Chris Doman told to the BBC.

Ukraine Energy Ministry

Yulia Kvitko Ukraine Cyberpolice spokeswoman said “the attack is an isolated one and no other government websites affected. This case is not large-scale. If necessary, we are ready to react and help”.

Our specialists are working right now … We do not know how long it will take to resolve the issue. Ukrenergo, Energoatom – everything is okay with their sites, it’s only our site that does not work.

The ransomware is a turnkey business for some criminals, and victims still pay the ever-increasing demands for ransom, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

To defends with ransomware attacks take regular backups of your data and test your Backups that perfectly available for any time to be restored.Use Strong Firewall to block the command & control server callbacks.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

MITRE Releases OCCULT Framework to Address AI Security Challenges

MITRE has unveiled the Offensive Cyber Capability Unified LLM Testing (OCCULT) framework, a groundbreaking...

Genea IVF Clinic Cyberattack Threatens Thousands of Patient Records

A significant cybersecurity breach at Genea, one of Australia’s largest in vitro fertilization (IVF)...

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...