Meow Ransomware Hits Finger Beton Unternehmensgruppe in Germany

Incident Date: Nov 09, 2024

Attack Overview
VICTIM
Finger Beton Unternehmensgruppe
INDUSTRY
Construction
LOCATION
Germany
ATTACKER
Meow
FIRST REPORTED
November 9, 2024

Ransomware Attack on Finger Beton Unternehmensgruppe by Meow Ransomware Group

On November 11, Finger Beton Unternehmensgruppe, a leading German manufacturer of precast concrete components, became the latest victim of a ransomware attack by the Meow ransomware group. This attack has compromised over 350 GB of sensitive data, posing significant risks to the company's operations and client confidentiality.

About Finger Beton Unternehmensgruppe

Founded in 1885, Finger Beton Unternehmensgruppe has established itself as a prominent player in the construction sector, specializing in eco-friendly precast concrete components. The company operates across eight locations in Germany and employs approximately 300 skilled workers. Finger Beton is renowned for its innovative engineering solutions and commitment to sustainability, producing products that meet stringent industry standards. Their involvement in data center infrastructure and rainwater management systems highlights their focus on modern construction needs.

Details of the Ransomware Attack

The Meow ransomware group orchestrated the attack, compromising a wide range of confidential information, including employee personal identification details, client contact information, project agreements, financial documents, and legal compliance notifications. This breach exposes critical insights into Finger Beton's operations, potentially affecting its business integrity and client relationships. The data is being marketed as a comprehensive package, offering a detailed view into the company's internal workings.

Profile of Meow Ransomware Group

Meow Ransomware emerged in late 2022 and is associated with the Conti v2 ransomware variant. Known for targeting industries with sensitive data, the group employs various infection methods, including phishing emails and exploiting RDP vulnerabilities. They use a combination of ChaCha20 and RSA-4096 algorithms to encrypt data. Meow Ransomware distinguishes itself by maintaining a data leak site where they list victims who haven't paid the ransom. Their activities have primarily targeted organizations in the United States, but they have also attacked entities in other countries.

Potential Vulnerabilities

Finger Beton's involvement in data center infrastructure and its extensive digital operations may have made it an attractive target for the Meow ransomware group. The company's reliance on digital systems for managing sensitive client and project data could have provided entry points for the ransomware attack. The breach underscores the importance of cybersecurity measures, especially for companies handling critical infrastructure projects.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.