WinFashion ERP Hit by ARCUS MEDIA Ransomware, Disrupting Global Operations

Incident Date: Jun 12, 2024

Attack Overview
VICTIM
WinFashion ERP
INDUSTRY
Software
LOCATION
India
ATTACKER
Arcus Media
FIRST REPORTED
June 12, 2024

WinFashion ERP Victim of ARCUS MEDIA Ransomware Attack

Company Overview

WinFashion, founded in 1995 and headquartered in the United States, is a leading provider of ERP software solutions tailored for the fashion and apparel industry. The company operates internationally with offices in China, India, and the US. Known for its expertise, WinFashion has over 300 installations globally, including in countries like China, Cambodia, Italy, and India. Their ERP software integrates various business processes, offering features such as inventory management, order processing, accounting, and production tracking.

Attack Overview

On June 11, 2024, WinFashion fell victim to a ransomware attack orchestrated by the ARCUS MEDIA group. The attack was announced on ARCUS MEDIA's dark web leak site, where they claimed responsibility. The ransomware group is known for its sophisticated tactics, including phishing emails for initial access, custom ransomware binaries, and obfuscation techniques to evade detection.

Vulnerabilities and Impact

WinFashion's extensive global operations and reliance on integrated ERP systems made it a lucrative target for ransomware attacks. The company's need for real-time data and seamless operations across multiple locations could have been exploited by the attackers. The attack likely disrupted their business processes, affecting inventory management, order processing, and financial operations, thereby impacting their clients in the fashion industry.

About ARCUS MEDIA

ARCUS MEDIA, active since May 2024, distinguishes itself with a unique affiliate program and a Ransomware-as-a-Service (RaaS) model. The group employs direct and double extortion methods, using phishing emails, custom ransomware binaries, and obfuscation techniques. They have targeted various sectors, including government, banking, healthcare, and IT. Their operations are similar to larger ransomware groups like DarkSide and REvil but with distinct TTPs and an exclusive affiliate program.

Penetration Methods

ARCUS MEDIA likely penetrated WinFashion's systems through phishing emails containing malicious attachments or links. Once inside, they deployed custom ransomware binaries and used scripts to execute the payload. The group also employed obfuscation techniques to evade detection and maintain persistence within the network, possibly using tools like Mimikatz for credential dumping and privilege escalation.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.