Arcus Media Ransomware Strikes Langescheid GbR

Incident Date: Jun 04, 2024

Attack Overview
VICTIM
Langescheid GbR
INDUSTRY
Consumer Services
LOCATION
Germany
ATTACKER
Arcus Media
FIRST REPORTED
June 4, 2024

Ransomware Attack on Langescheid GbR by Arcus Media

Overview of Langescheid GbR

Langescheid GbR is a traditional logistics partner company based in Germany, established in 1976. The company provides transportation services in suburban, national long-distance, and international traffic. Specializing in transporting sea-containers from the west North Sea ports of Antwerp and Rotterdam, Langescheid GbR operates a sizable vehicle fleet, including articulated towing vehicles and 13.6m curtain semitrailers equipped with quality "Edscha" products. The company is known for its ability to adapt its vehicle park to accommodate customers' individual needs.

Attack Overview

The Arcus Media ransomware group has claimed responsibility for a ransomware attack on Langescheid GbR. The attack was announced via Arcus Media's dark web leak site, adding Langescheid GbR to their list of victims. The exact details of the attack, including the ransom demanded and the extent of the data compromised, have not been disclosed. However, the attack highlights the vulnerabilities that even well-established companies face in the current cyber threat landscape.

About Arcus Media

Arcus Media is a relatively new ransomware group, active since May 2024. The group employs direct and double extortion methods, using phishing emails to gain initial access, deploying custom ransomware binaries, and employing obfuscation techniques to evade detection. Arcus Media operates on a Ransomware-as-a-Service (RaaS) model, allowing other threat actors to use their malware in exchange for a share of the profits. The group has a unique affiliate program requiring new affiliates to be referred by trusted members and vetted before participation.

Penetration and Vulnerabilities

The ransomware group likely penetrated Langescheid GbR's systems through phishing emails containing malicious attachments or links. Once inside the network, the group deployed custom ransomware binaries and used scripts to execute the payload. The use of obfuscation techniques and disabling security tools helped them evade detection. Langescheid GbR's reliance on digital systems for logistics and transportation services made them a lucrative target for ransomware attacks, emphasizing the need for robust cybersecurity measures.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.