PEZ Candy Faces Major Ransomware Threat from Abyss Group
Ransomware Attack on PEZ Candy by Abyss Group
PEZ Candy, Inc., a globally recognized brand known for its iconic candy dispensers and fruity flavored candies, has reportedly fallen victim to a ransomware attack by the Abyss group. This incident highlights the ongoing threat of cyberattacks on established consumer brands.
Overview of PEZ Candy
Founded in 1927 in Vienna, Austria, PEZ Candy has grown into a significant player in the global confectionery market. The company operates from Orange, Connecticut, and Traun, Austria, distributing approximately 70 million dispensers and over 5 billion candies annually across more than 80 countries. PEZ is renowned for its innovative candy dispensing system and collectible character dispensers, which have become a staple in popular culture.
Details of the Ransomware Attack
The Abyss ransomware group claims to have infiltrated PEZ's systems, exfiltrating approximately 1.1 terabytes of sensitive data. The group has set a ransom deadline, demanding compliance to prevent the release or further exploitation of the compromised data. This breach could potentially expose a significant amount of proprietary and confidential information, posing a substantial risk to PEZ's operations and reputation.
About Abyss Ransomware Group
Abyss Ransomware, also known as Abyss Locker, emerged in 2023 and is known for its aggressive tactics and multi-extortion strategies. The group targets various sectors, including consumer services, and has expanded its capabilities to include both Windows and Linux systems. Abyss distinguishes itself by employing a double extortion tactic, encrypting files and threatening to release exfiltrated data if ransom demands are not met.
Potential Vulnerabilities
PEZ's global operations and significant market presence make it an attractive target for cybercriminals. The company's reliance on digital systems for manufacturing and distribution could have provided entry points for the ransomware group. Abyss typically gains access through phishing emails, exploiting weak SSH configurations, and targeting known vulnerabilities in exposed servers.
Sources
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!