Abyss Ransomware Hits Canadian Truck Equipment Supplier
Abyss Ransomware Group Targets Commercial Truck Equipment Co.
Commercial Truck Equipment Co., a leading Canadian supplier of vocational vehicles and work truck equipment, has fallen victim to a ransomware attack orchestrated by the Abyss ransomware group. The attackers claim to have exfiltrated 1 TB of uncompressed data and have threatened to release the password to access this data on September 4, 2024, if their demands are not met.
Company Overview
Commercial Truck Equipment Co. is a prominent player in the transportation sector, specializing in providing a wide range of truck equipment solutions. With over 75 years of experience, the company operates from ten main branches across Canada, employing more than 350 staff members and utilizing over 250,000 square feet of combined service and production space. Their extensive product line includes crane trucks, tow and recovery vehicles, refuse collection vehicles, dump and gravel trucks, snow and ice management trucks, landscape bodies, trailers, and truck hydraulic systems. The company is known for its commitment to quality and customer service, offering tailored solutions to meet the specific needs of its clients.
Attack Overview
The Abyss ransomware group has claimed responsibility for the attack on Commercial Truck Equipment Co. via their dark web leak site. The group alleges that they have exfiltrated 1 TB of uncompressed data from the company. If their demands are not met, they have threatened to publish the password to access this data on September 4, 2024. This attack highlights the vulnerabilities that even well-established companies can face in the realm of cybersecurity.
About Abyss Ransomware Group
The Abyss ransomware group is a multi-extortion operation that emerged in March 2023, primarily targeting VMware ESXi environments. They are known for hosting a TOR-based website where they list victims along with exfiltrated data if the victims fail to comply with their demands. The group's operations are believed to have started many months prior to the posting of their TOR-based blog, with previous variations of Abyss, including a Windows variant, observed as far back as 2019. Abyss Locker ransomware campaigns have targeted various industries, including finance, manufacturing, information technology, and healthcare, with a primary focus on the United States.
Penetration and Impact
The initial access for Abyss Locker infections can vary, with affiliated threat actors observed targeting weak SSH configurations through SSH brute force attacks to establish entry to exposed servers. For Linux, Abyss Locker payloads are derived from the Babuk codebase and function similarly. The ransomware has a standard command line interface, requiring the threat actor to define a targeted path for encryption. Encrypted files are noted with the ".crypt" extension, and any folder containing encrypted files will also contain Abyss Locker ransom notes with the .README_TO_RESTORE extension.
Sources
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!