Co-op Agro Centre Data Breach by Akira Ransomware Group
Ransomware Attack on Co-op Agro Centre by Akira Group
In a significant cybersecurity breach, Co-op Agro Centre, a key player in the Canadian agricultural sector, has been targeted by the notorious Akira ransomware group. This attack has compromised over 50 GB of sensitive data, including employee medical records and personal employment information.
About Co-op Agro Centre
Co-op Agro Centre operates under Federated Co-operatives Limited (FCL), headquartered in Saskatoon, Saskatchewan. As a prominent agricultural cooperative, it provides essential services and products to farmers across Canada, including farm supplies, crop inputs, and agronomy services. The cooperative's strategic locations in regions like Saskatoon, Hepburn, and Watrous make it a vital resource for enhancing agricultural productivity and sustainability. With a workforce that contributes to FCL's overall employment of over 2,000 people, Co-op Agro Centre plays a crucial role in supporting local farming operations.
Attack Overview
The Akira ransomware group has reportedly accessed a trove of internal corporate documents from Co-op Agro Centre. The compromised data includes sensitive employee information such as Social Security Numbers (SSN) and Social Insurance Numbers (SIN), alongside various confidential internal documents. This breach highlights the vulnerabilities that agricultural cooperatives face, particularly those with extensive digital infrastructures and sensitive data repositories.
About Akira Ransomware Group
Emerging in March 2023, Akira operates as a Ransomware-as-a-Service (RaaS) entity, employing a double extortion model. The group is known for its sophisticated encryption techniques and potential affiliations with the former Conti group. Akira targets sectors with high-stakes data, including healthcare, finance, and manufacturing, and has recently expanded its capabilities to include a Rust-based Linux variant for VMware ESXi environments. This adaptability underscores Akira's strategic focus on cross-platform targeting.
Potential Vulnerabilities and Penetration
Akira's penetration into Co-op Agro Centre's systems could have been facilitated through compromised VPN credentials or unpatched vulnerabilities in network infrastructure. The group's use of spear-phishing and exploitation of known vulnerabilities in Cisco ASA and FortiClient are common tactics for initial access. Once inside, Akira employs lateral movement tools and defense evasion techniques to maintain a persistent presence within the network, ultimately leading to the encryption and exfiltration of critical data.
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!