PEZ Candy Faces Major Ransomware Threat from Abyss Group

Incident Date: Dec 06, 2024

Attack Overview
VICTIM
PEZ
INDUSTRY
Consumer Services
LOCATION
USA
ATTACKER
Abyss
FIRST REPORTED
December 6, 2024

Ransomware Attack on PEZ Candy by Abyss Group

PEZ Candy, Inc., a globally recognized brand known for its iconic candy dispensers and fruity flavored candies, has reportedly fallen victim to a ransomware attack by the Abyss group. This incident highlights the ongoing threat of cyberattacks on established consumer brands.

Overview of PEZ Candy

Founded in 1927 in Vienna, Austria, PEZ Candy has grown into a significant player in the global confectionery market. The company operates from Orange, Connecticut, and Traun, Austria, distributing approximately 70 million dispensers and over 5 billion candies annually across more than 80 countries. PEZ is renowned for its innovative candy dispensing system and collectible character dispensers, which have become a staple in popular culture.

Details of the Ransomware Attack

The Abyss ransomware group claims to have infiltrated PEZ's systems, exfiltrating approximately 1.1 terabytes of sensitive data. The group has set a ransom deadline, demanding compliance to prevent the release or further exploitation of the compromised data. This breach could potentially expose a significant amount of proprietary and confidential information, posing a substantial risk to PEZ's operations and reputation.

About Abyss Ransomware Group

Abyss Ransomware, also known as Abyss Locker, emerged in 2023 and is known for its aggressive tactics and multi-extortion strategies. The group targets various sectors, including consumer services, and has expanded its capabilities to include both Windows and Linux systems. Abyss distinguishes itself by employing a double extortion tactic, encrypting files and threatening to release exfiltrated data if ransom demands are not met.

Potential Vulnerabilities

PEZ's global operations and significant market presence make it an attractive target for cybercriminals. The company's reliance on digital systems for manufacturing and distribution could have provided entry points for the ransomware group. Abyss typically gains access through phishing emails, exploiting weak SSH configurations, and targeting known vulnerabilities in exposed servers.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.