Central Power Systems and Services: Targeted by Cybercriminals
Ransomware Attack on Central Power Systems and Services by Hunters International
Overview of the Attack
A prominent service provider in the power systems sector, Central Power Systems and Services, was recently targeted by a ransomware attack orchestrated by Hunters International. This cybercriminal group managed to exfiltrate approximately 1.3 terabytes of data, encompassing over 2 million files.
Company Profile
Central Power Systems and Services, headquartered in Liberty, Missouri, has been a significant player in the power systems industry since 1954. As the exclusive distributor for Allison Transmissions, Detroit Diesel, MTU, Doosan, and Liebherr in specific regions, the company boasts a robust portfolio and a substantial market presence. With annual revenues reaching $71 million in 2024, and a workforce of over 400 employees across 21 locations, the company is a critical node in the supply and maintenance of industrial and construction equipment.
Significance in the Industry
The company's unique position as the sole distributor for several major manufacturers in Kansas, Western Missouri, and Northern Oklahoma highlights its importance in the regional market. This exclusivity not only enhances their market influence but also increases their vulnerability as a significant target for cyber-attacks, given the critical nature of their service and distribution network.
Potential Vulnerabilities
The extensive data breach suggests potential vulnerabilities in the company’s cybersecurity measures. The nature of their business requires robust protection of sensitive data, including client information, proprietary business data, and supply chain logistics. The scale of the exfiltrated data indicates that these areas might have been compromised, making them a lucrative target for Hunters International, whose modus operandi includes extensive data theft for leverage in ransom negotiations.
Sources
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!