Deutsche Industrie Video System Targeted by Akira Ransomware Group

Incident Date: Nov 29, 2024

Attack Overview
VICTIM
Deutsche Industrie Video System
INDUSTRY
Business Services
LOCATION
Germany
ATTACKER
Akira
FIRST REPORTED
November 29, 2024

Ransomware Attack on Deutsche Industrie Video System by Akira Group

Deutsche Industrie Video System GmbH (DIVIS), a prominent provider of video surveillance solutions tailored for the logistics sector, has allegedly been targeted by a ransomware attack attributed to the Akira group. Situated in Bordesholm, Germany, DIVIS is a medium-sized, family-owned enterprise with a workforce exceeding 80 employees, catering to over 500 clients across 20 European nations. The company's cutting-edge solutions, including CargoVIS, ParcelVIS, DamageVIS, and StoreVIS, are pivotal to logistics operations, enhancing tracking and monitoring capabilities.

The attack purportedly compromised a substantial amount of corporate data, encompassing sensitive financial documents and contact information of both employees and customers. This incident underscores the vulnerabilities that even technologically advanced firms like DIVIS encounter in today's cyber threat landscape. The integration of video management capabilities with logistics operations, while innovative, may have rendered an appealing target for threat actors aiming to exploit high-value data environments.

Akira, a Ransomware-as-a-Service (RaaS) entity, has rapidly gained notoriety in the cybercrime domain since its inception in March 2023. Renowned for its double extortion model, Akira encrypts and threatens to disclose sensitive data, demanding ransoms ranging from $200,000 to $4 million. The group is noted for its sophisticated encryption techniques and alleged ties to the former Conti group, employing advanced methodologies to target sectors with high-stakes data.

In the case of DIVIS, Akira may have infiltrated the company's systems through spear-phishing attacks, exploiting unpatched vulnerabilities, or compromised VPN credentials. Once inside, Akira's affiliates likely utilized lateral movement tools to expand network access, systematically disabling security measures to maintain a persistent presence. The group's deployment of a Rust-based Linux variant for VMware ESXi environments highlights its commitment to cross-platform targeting, broadening its threat reach across diverse technological infrastructures.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.