Chema Faces Ransomware Threat from Sarcoma Group

Incident Date: Nov 30, 2024

Attack Overview
VICTIM
Chema
INDUSTRY
Manufacturing
LOCATION
Peru
ATTACKER
Sarcoma
FIRST REPORTED
November 30, 2024

Ransomware Attack on Chema by Sarcoma Group

Chema, a leading manufacturer in Peru's construction sector, has allegedly fallen victim to a ransomware attack orchestrated by the Sarcoma group. Known for its high-quality tile setting materials, Chema has been a cornerstone in the industry for over 43 years. The company operates four manufacturing plants and seven warehouses across Peru, ensuring a distribution network that serves various market segments, including home centers and hardware stores.

Chema's Industry Standing and Vulnerabilities

Chema's reputation is built on its commitment to quality and reliability, with products that are well-regarded for their ease of application and effectiveness. This has fostered a loyal customer base and a steady supply chain, crucial in the competitive construction market. However, the company's extensive operational scale and significant market presence also make it an attractive target for cybercriminals. The recent acquisition by Sika AG, a Swiss specialty chemicals company, further underscores Chema's market significance and potential vulnerabilities in cybersecurity.

Attack Overview

The Sarcoma ransomware group has claimed responsibility for exfiltrating 60 GB of sensitive data from Chema. This breach has been publicly acknowledged by Sarcoma, who have listed Chema as a new victim on their dark web leak site. The compromised data reportedly includes a substantial archive of files, highlighting the potential impact on Chema's operations and data security. The attack underscores the growing threat of ransomware groups targeting key players in various industries.

Sarcoma Ransomware Group

Sarcoma is a relatively new but aggressive ransomware group that emerged in October 2024. The group has quickly established itself as a significant threat, particularly in Australia and New Zealand, by employing a double extortion model. This involves encrypting victims' data and threatening to leak it if the ransom is not paid. Sarcoma distinguishes itself by targeting supply chains and using strong encryption methods, making it difficult for victims to recover their data without paying the ransom.

Potential Penetration Methods

While specific details of how Sarcoma penetrated Chema's systems are not publicly available, the group is known for compromising vendors to gain access to larger networks. Once inside, they use various tools to navigate through systems, escalating privileges and compromising additional devices. This sophisticated approach allows Sarcoma to exfiltrate sensitive information before encrypting files, using this data as leverage in ransom negotiations.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.