Tuesday, March 25, 2025
HomeRansomwareWorld's Largest Data Center provider Hit by Netwalker Ransomware

World’s Largest Data Center provider Hit by Netwalker Ransomware

Published on

SIEM as a Service

Follow Us on Google News

Recently, the world’s largest data center provider Equinix hit by Netwalker Ransomware, and currently, Equinix is investigating the whole matter. Till now, they came to know that they had a ransomware attack on their internal systems, but the central core of its customer-facing services endured to be unaffected.

Equinix detected the ransomware attack at 12:45 a.m. ET on Thursday. Equinix is careful, trying its best to bypass the circumstances as it is one of the world’s largest data providers with 205 data centers, nearly in 25 countries on five continents.

Equinix Hit by Netwalker Ransomware

Equinix hit by the Netwalker ransomware on the Labor Day holiday weekend, and luckily, the Equinix core function that is customer-facing service is not affected by this ransomware. Still, the threat actors have stolen much data.

The threat actors have sent a note just like other ransomware attacks. The note specifies a special message for the victim; it has a link to a screenshot of professedly stolen data. All the screenshots that have been mentioned by the threat actors include various folders.

The ransom note also adds a link that will connect to the Netwalker Tor payment site, and here the hackers have charged a $4.5 million ransom (455 bitcoin). In case if the company did not pay the demanded money on time, then the ransom would become double.

The name of these folders indicates they cover financial information, payroll, accounting, audits, data center reports, and much more essential data.

Many RDP servers are exposed

The researchers affirmed that exposed remote desktop servers are one of the most common methods that are used by hackers to negotiate a network system. The Advanced Intel’s Andariel intelligence platform Asserted that there are nearly 74 known Equinix remote desktop servers, and their all login credentials are being sold by the hackers in private sales.

The report also claims that among 74 known Equinix remote desktop servers, most of the servers are assembled in Australia, Turkey, and Brazil. That’s why the servers are being negotiated, as its leading service that is customer-facing services is endured to be unaffected.

However, Equinix has given $750 million as a ransom to the threat actors so that they can obtain 13 Canadian data centers from Bell Canada. It is expected to produce more than $100 million in annual revenue and open gateways for North America to Asia and Europe.

Also recommended to read a complete ransomware Mitigation Checklistand Anti-Ransomware Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Deploy Fake Semrush Ads to Steal Google Account Credentials

In a recent cybersecurity threat, hackers have been using fake Semrush ads to target...

Pocket Card Users Targeted in Sophisticated Phishing Campaign

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec....

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

A recent report from Trend Micro has revealed that a new variant of the...

New Rust-Based Linux Kernel Module Unveiled to Detect Rootkits

A recent development in Linux kernel security has led to the creation of a...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

A recent report from Trend Micro has revealed that a new variant of the...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER...