RansomHub Attacks Waive Software Exposing Client Data

Incident Date: Nov 18, 2024

Attack Overview
VICTIM
Waive Corporate Compliance Software
INDUSTRY
Software
LOCATION
Australia
ATTACKER
Ransomhub
FIRST REPORTED
November 18, 2024

RansomHub Targets Waive Corporate Compliance Software in Ransomware Attack

On November 19, RansomHub, a notorious ransomware group, launched a significant attack on Waive Corporate Compliance Software, a RegTech company based in Ormond, Victoria, Australia. Waive specializes in simplifying compliance processes for accountants and businesses dealing with the Australian Securities and Investments Commission (ASIC). The attack resulted in a data leak of 30GB, containing sensitive client information such as names, addresses, birth dates, and bank transaction details.

Waive Corporate Compliance Software: A Profile

Waive Corporate Compliance Software is a small company with a lean operational structure, employing approximately one individual. Despite its size, Waive has carved a niche in the RegTech industry by offering innovative solutions that automate ASIC compliance workflows. The platform integrates with popular accounting software like Xero, enhancing administrative efficiency and reducing the risk of compliance oversights. Waive's standout features include automated reminders, branded client portals, and nightly data downloads, which streamline the compliance process for accountants and bookkeepers.

Vulnerabilities and Targeting by RansomHub

Waive's reliance on automated data processes and integration with external software like Xero may have presented vulnerabilities that RansomHub exploited. The ransomware group is known for its sophisticated techniques, including phishing campaigns and exploiting unpatched system vulnerabilities. Waive's small size and focus on technology development might have limited its resources for cybersecurity measures, making it an attractive target for RansomHub.

RansomHub's Distinctive Approach

RansomHub distinguishes itself in the ransomware landscape through its Ransomware-as-a-Service (RaaS) model, which allows affiliates to conduct attacks using its platform. The group employs double extortion tactics, encrypting data and threatening to release it unless a ransom is paid. RansomHub's operations are characterized by speed and efficiency, leveraging advanced data exfiltration techniques and targeting high-value sectors. The group's modular architecture and use of Curve 25519 elliptic curve encryption make it a formidable threat to organizations worldwide.

Attack Overview

The attack on Waive Corporate Compliance Software underscores the growing threat of ransomware to small and medium-sized enterprises in the RegTech sector. RansomHub's demand for the publication of the stolen data within five days highlights the pressure tactics used by ransomware groups to extract payments from their victims. As Waive navigates the aftermath of this breach, the incident serves as a stark reminder of the importance of cybersecurity vigilance in the face of evolving ransomware threats.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.