Ransomware Attack on CAS Software by Sarcoma Group

Incident Date: Oct 31, 2024

Attack Overview
VICTIM
CAS Software
INDUSTRY
Software
LOCATION
Germany
ATTACKER
Sarcoma
FIRST REPORTED
October 31, 2024

Ransomware Attack on CAS Software by Sarcoma Group

On October 31, CAS Software AG, a prominent provider of customer relationship management (CRM) solutions, fell victim to a ransomware attack orchestrated by the infamous Sarcoma group. This incident underscores the escalating threat of ransomware attacks targeting software companies, especially those with extensive data repositories.

About CAS Software AG

Established in 1986 in Karlsruhe, Germany, CAS Software AG focuses on CRM solutions designed for small and medium-sized enterprises (SMEs). The company employs around 470 staff members and caters to over 520,000 users in more than 40 countries. CAS Software AG is well-known for its flagship product, CAS genesisWorld, which optimizes customer relationship management by centralizing customer data and streamlining processes across departments. The company's dedication to innovation and data security has positioned it as a leader in the European CRM market.

Details of the Attack

The Sarcoma ransomware group reportedly exfiltrated 6 GB of sensitive data from CAS Software, including SQL databases and emails from the company's MS Exchange system. The attackers have set a deadline of November 21 for compliance, threatening to release the stolen data publicly if their demands are not met. This attack highlights the vulnerabilities that even well-established companies face in the evolving cyber threat landscape.

Profile of the Sarcoma Ransomware Group

Sarcoma is a relatively new but aggressive ransomware group that has quickly gained notoriety for its significant data breaches. The group operates a darknet leak site where it lists its victims and provides evidence of stolen data. Sarcoma distinguishes itself by not publicly listing ransom amounts, instead leveraging data leaks as a primary means of coercion. The group employs a double extortion strategy, exfiltrating sensitive information and threatening public exposure if ransoms are not paid.

Potential Vulnerabilities and Penetration Tactics

While the exact method of penetration into CAS Software's systems remains unclear, common vulnerabilities in CRM systems, such as outdated software, weak access controls, and insufficient data encryption, could have been exploited. The attack on CAS Software highlights the importance of comprehensive cybersecurity measures, particularly for companies handling large volumes of sensitive customer data.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.