Eurobulk Ltd Faces Major Ransomware Threat from Play Group

Incident Date: Sep 23, 2024

Attack Overview
VICTIM
Eurobulk Ltd
INDUSTRY
Transportation
LOCATION
Greece
ATTACKER
Play
FIRST REPORTED
September 23, 2024

Ransomware Attack on Eurobulk Ltd: A Detailed Analysis

Eurobulk Ltd, a prominent maritime management company based in Athens, Greece, has recently been targeted by the Play ransomware group. This attack has raised significant concerns within the maritime industry, given Eurobulk's critical role in managing ocean-going vessels, particularly dry bulk and container ships.

Company Profile and Industry Standing

Established in 1994, Eurobulk Ltd operates under the leadership of CEO Aristides Pittas and employs approximately 100 onshore professionals and over 1,200 maritime staff. The company manages a diverse fleet of 28 vessels, emphasizing safety and risk management. Eurobulk is recognized for its commitment to technological advancements in ship navigation and voyage optimization, aligning with global sustainability trends. Its strategic location in Greece, a key maritime hub, allows it to leverage local expertise while maintaining a global reach.

Details of the Ransomware Attack

The Play ransomware group claims to have exfiltrated a significant amount of sensitive data from Eurobulk Ltd. The compromised information reportedly includes private and personal confidential data, client documents, budget details, payroll records, accounting files, contracts, tax information, identification documents, and financial information. This breach highlights the vulnerabilities that maritime companies face, particularly those with extensive digital operations and data management systems.

About the Play Ransomware Group

Active since June 2022, the Play ransomware group, also known as PlayCrypt, has targeted various industries, including transportation, IT, and critical infrastructure. The group is known for exploiting vulnerabilities in RDP servers, FortiOS, and Microsoft Exchange, among others. Unlike typical ransomware groups, Play does not include an initial ransom demand in its notes, directing victims to contact them via email instead. This approach, along with their use of custom tools and techniques, distinguishes them in the cyber threat landscape.

Potential Vulnerabilities and Attack Vectors

Eurobulk Ltd's extensive digital infrastructure, necessary for managing its fleet and operations, may have been a target for the Play group. The ransomware group likely exploited vulnerabilities in the company's network, possibly through compromised VPN accounts or unpatched software vulnerabilities. The maritime industry's reliance on digital systems for navigation, communication, and data management makes it a lucrative target for cybercriminals.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.