Monday, November 4, 2024
HomeRansomwareWorld's Largest Data Center provider Hit by Netwalker Ransomware

World’s Largest Data Center provider Hit by Netwalker Ransomware

Published on

Malware protection

Recently, the world’s largest data center provider Equinix hit by Netwalker Ransomware, and currently, Equinix is investigating the whole matter. Till now, they came to know that they had a ransomware attack on their internal systems, but the central core of its customer-facing services endured to be unaffected.

Equinix detected the ransomware attack at 12:45 a.m. ET on Thursday. Equinix is careful, trying its best to bypass the circumstances as it is one of the world’s largest data providers with 205 data centers, nearly in 25 countries on five continents.

Equinix Hit by Netwalker Ransomware

Equinix hit by the Netwalker ransomware on the Labor Day holiday weekend, and luckily, the Equinix core function that is customer-facing service is not affected by this ransomware. Still, the threat actors have stolen much data.

- Advertisement - SIEM as a Service

The threat actors have sent a note just like other ransomware attacks. The note specifies a special message for the victim; it has a link to a screenshot of professedly stolen data. All the screenshots that have been mentioned by the threat actors include various folders.

The ransom note also adds a link that will connect to the Netwalker Tor payment site, and here the hackers have charged a $4.5 million ransom (455 bitcoin). In case if the company did not pay the demanded money on time, then the ransom would become double.

The name of these folders indicates they cover financial information, payroll, accounting, audits, data center reports, and much more essential data.

Many RDP servers are exposed

The researchers affirmed that exposed remote desktop servers are one of the most common methods that are used by hackers to negotiate a network system. The Advanced Intel’s Andariel intelligence platform Asserted that there are nearly 74 known Equinix remote desktop servers, and their all login credentials are being sold by the hackers in private sales.

The report also claims that among 74 known Equinix remote desktop servers, most of the servers are assembled in Australia, Turkey, and Brazil. That’s why the servers are being negotiated, as its leading service that is customer-facing services is endured to be unaffected.

However, Equinix has given $750 million as a ransom to the threat actors so that they can obtain 13 Canadian data centers from Bell Canada. It is expected to produce more than $100 million in annual revenue and open gateways for North America to Asia and Europe.

Also recommended to read a complete ransomware Mitigation Checklistand Anti-Ransomware Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit

The Evasive Panda group deployed a new C# framework named CloudScout to target a...

Massive Midnight Blizzard Phishing Attack Using Weaponized RDP Files

Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals...

Sophisticated Phishing Attack Targeting Ukraine Military Sectors

The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215...

Chinese Hackers Attacking Microsoft Customers With Sophisticated Password Spray Attacks

Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

A Massive Hacking Toolkit From “You Dun” Threat Group Developed To Lauch Massive Cyber Attack

The "You Dun" hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging...

Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions

In July 2024, the ransomware group Embargo targeted US companies using the malicious loader...

Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks

Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a...