Saturday, June 14, 2025
HomeRansomwareWorld's Largest Data Center provider Hit by Netwalker Ransomware

World’s Largest Data Center provider Hit by Netwalker Ransomware

Published on

SIEM as a Service

Follow Us on Google News

Recently, the world’s largest data center provider Equinix hit by Netwalker Ransomware, and currently, Equinix is investigating the whole matter. Till now, they came to know that they had a ransomware attack on their internal systems, but the central core of its customer-facing services endured to be unaffected.

Equinix detected the ransomware attack at 12:45 a.m. ET on Thursday. Equinix is careful, trying its best to bypass the circumstances as it is one of the world’s largest data providers with 205 data centers, nearly in 25 countries on five continents.

Equinix Hit by Netwalker Ransomware

Equinix hit by the Netwalker ransomware on the Labor Day holiday weekend, and luckily, the Equinix core function that is customer-facing service is not affected by this ransomware. Still, the threat actors have stolen much data.

- Advertisement - Google News

The threat actors have sent a note just like other ransomware attacks. The note specifies a special message for the victim; it has a link to a screenshot of professedly stolen data. All the screenshots that have been mentioned by the threat actors include various folders.

The ransom note also adds a link that will connect to the Netwalker Tor payment site, and here the hackers have charged a $4.5 million ransom (455 bitcoin). In case if the company did not pay the demanded money on time, then the ransom would become double.

The name of these folders indicates they cover financial information, payroll, accounting, audits, data center reports, and much more essential data.

Many RDP servers are exposed

The researchers affirmed that exposed remote desktop servers are one of the most common methods that are used by hackers to negotiate a network system. The Advanced Intel’s Andariel intelligence platform Asserted that there are nearly 74 known Equinix remote desktop servers, and their all login credentials are being sold by the hackers in private sales.

The report also claims that among 74 known Equinix remote desktop servers, most of the servers are assembled in Australia, Turkey, and Brazil. That’s why the servers are being negotiated, as its leading service that is customer-facing services is endured to be unaffected.

However, Equinix has given $750 million as a ransom to the threat actors so that they can obtain 13 Canadian data centers from Bell Canada. It is expected to produce more than $100 million in annual revenue and open gateways for North America to Asia and Europe.

Also recommended to read a complete ransomware Mitigation Checklistand Anti-Ransomware Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Unpatched IT Tool Opens Door – Hackers Breach Billing Software Firm via SimpleHelp RMM

Cybersecurity professionals and business leaders are on high alert following a confirmed breach of...

Fog Ransomware Uses Pentesting Tools to Steal Data and Launch Attacks

Fog ransomware incidents in recent years have exposed a dangerous new trend in cybercrime:...

Sensata Technologies Faces Disruption Due to Ransomware Attack

Sensata Technologies, Inc., a major technology company based in Attleboro, Massachusetts, has disclosed a...