Kyung Chang Industrial Targeted: A Closer Look at the Ransomware Attack

Incident Date: May 04, 2024

Attack Overview
VICTIM
Kyung Chang Industrial
INDUSTRY
Manufacturing
LOCATION
South Korea
ATTACKER
Underground Team
FIRST REPORTED
May 4, 2024

Ransomware Attack on Kyung Chang Industrial by Underground Team

Company Profile: Kyung Chang Industrial

Kyung Chang Industrial Co., Ltd., established in October 1961, is a prominent player in the global automotive supply chain, specializing in the manufacturing of automotive drivetrain and chassis parts. With a workforce of 1,470 employees and annual sales reaching 588.7 billion Korean Won (434 M USD), the company stands out due to its extensive product range and significant market presence. Kyung Chang Industrial is a key supplier to major automotive manufacturers like Hyundai Motor Company, Kia Motors, and GM Korea. The company's commitment to quality and environmental management is underscored by its certifications in ISO9002, QS9000, TS16949, and ISO14001.

Details of the Ransomware Attack

The cyberattack on Kyung Chang Industrial was orchestrated by a group known as the Underground Team, utilizing a sophisticated ransomware strain. This attack resulted in the exfiltration of approximately 1.8 terabytes of sensitive data, including private documents, financial records, and personal information of employees. Notably, the attack did not specify a ransom demand but focused on the significant data breach, impacting the company's operational and financial confidentiality.

Technical Profile of Underground Team Ransomware

The Underground Team ransomware is a 64-bit GUI based application known for its aggressive tactics, including the deletion of backups, modification of registry settings, and halting critical services like MSSQLSERVER. This ransomware leverages API functions to identify system volumes and deploys its payload across multiple system folders, strategically encrypting files while avoiding certain filenames, extensions, and directories to remain undetected.

Infection Vector and System Penetration

The likely vector for the ransomware's entry into Kyung Chang Industrial’s systems was through social engineering tactics, possibly involving phishing emails with malicious attachments or links to compromised websites. These emails were presumably crafted to appear legitimate, enticing employees to inadvertently initiate the ransomware. This method highlights the importance of robust cybersecurity training and awareness among staff as a critical defense mechanism against such threats.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.