SK Gas Hit by RA World Ransomware Exposing 700GB Data

Incident Date: Nov 12, 2024

Attack Overview
VICTIM
SK Gas
INDUSTRY
Healthcare Services
LOCATION
South Korea
ATTACKER
Ra World
FIRST REPORTED
November 12, 2024

Ransomware Attack on SK Gas: A Detailed Analysis

On November 13, SK Gas, a leading South Korean company in the liquefied petroleum gas (LPG) sector, fell victim to a ransomware attack orchestrated by the RA World group. This incident highlights the vulnerabilities faced by major energy suppliers in the digital age.

About SK Gas

Established in 1985, SK Gas Co., Ltd. is a pivotal player in South Korea's energy sector, responsible for over 50% of the nation's LPG supply. The company imports, stores, and distributes LPG, serving a diverse clientele that includes households, petrochemical refiners, and various industries. With a workforce of approximately 610 employees, SK Gas reported an annual revenue of $5.36 billion USD in 2023. The company's strategic initiatives in eco-friendly energy solutions and its expansion into gas power generation and fuel cells underscore its commitment to sustainability and innovation.

Attack Overview

The RA World ransomware group claimed responsibility for the attack, exfiltrating around 700 GB of sensitive data from SK Gas. This data reportedly includes business contracts and departmental information, posing significant risks to the company's operations and reputation. The attack underscores the growing threat of ransomware to critical infrastructure sectors, particularly those with extensive digital networks.

RA World Ransomware Group

RA World, known for its sophisticated ransomware tactics, has been active since April 2023. The group utilizes a modified version of the Babuk ransomware, employing advanced encryption methods to lock victims' data. Their operations are marked by multi-extortion tactics, where they not only encrypt data but also exfiltrate it to pressure victims into paying ransoms. RA World has expanded its target sectors from healthcare to include manufacturing and finance, demonstrating a broad and adaptable attack strategy.

Potential Vulnerabilities

SK Gas's extensive digital infrastructure, necessary for its global trading and logistical operations, may have presented vulnerabilities that RA World exploited. The group's typical attack vectors include phishing emails and exploiting weak credentials, which could have facilitated their initial access to SK Gas's systems. The attack highlights the need for enhanced cybersecurity measures in the energy sector, where the stakes are particularly high due to the critical nature of the services provided.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.