Arcus Media Ransomware Attack on Franja IT Solutions

Incident Date: Jun 04, 2024

Attack Overview
VICTIM
Franja IT Integradores de Tecnología
INDUSTRY
Business Services
LOCATION
Colombia
ATTACKER
Arcus Media
FIRST REPORTED
June 4, 2024

Ransomware Attack on Franja IT Integradores de Tecnología by Arcus Media

Overview of Franja IT Integradores de Tecnología

Franja IT Integradores de Tecnología, operating under the name Franja IT Solutions, is a prominent player in the Business Services sector. The company specializes in providing a comprehensive range of IT services, including software development, IT consulting, and managed services. Their standout offering is a cloud-based telephony solution that leverages the latest telecommunications technology. With over fifteen years of experience, Franja IT has been instrumental in optimizing technological infrastructure and improving operational efficiency for various businesses.

Details of the Ransomware Attack

On June 4, 2024, the Arcus Media ransomware group executed a ransomware attack on Franja IT Integradores de Tecnología. The attack was publicly claimed by Arcus Media via their dark web leak site. The extent of the data leak remains unknown, but the breach has raised significant concerns given Franja IT's role in managing sensitive technological infrastructure for its clients.

About Arcus Media Ransomware Group

Arcus Media is a relatively new ransomware group that has been active since May 2024. The group employs direct and double extortion methods, using phishing emails to gain initial access and deploying custom ransomware binaries. They operate on a Ransomware-as-a-Service (RaaS) model, allowing other threat actors to use their malware. Arcus Media distinguishes itself with a unique affiliate program that requires new affiliates to be referred and vetted.

Potential Vulnerabilities and Penetration Methods

Franja IT's extensive involvement in managing IT infrastructure and providing managed services makes it a lucrative target for ransomware groups like Arcus Media. The initial access was likely gained through phishing emails, a common tactic used by Arcus Media. Once inside, the group deployed obfuscated scripts to execute the ransomware payload and used tools like Mimikatz for privilege escalation. The attack underscores the importance of robust cybersecurity measures, especially for companies handling critical technological infrastructure.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.