Wintergreen Learning Materials Breached by Hunters International

Incident Date: Dec 12, 2024

Attack Overview
VICTIM
Wintergreen Learning Materials
INDUSTRY
Education
LOCATION
Canada
ATTACKER
Hunters International
FIRST REPORTED
December 12, 2024

Ransomware Attack on Wintergreen Learning Materials by Hunters International

Wintergreen Learning Materials, a prominent Canadian company specializing in educational supplies and furniture, recently fell victim to a ransomware attack orchestrated by the notorious group Hunters International. This attack has significantly disrupted Wintergreen's operations, as critical systems were encrypted, rendering them inaccessible. The attackers have demanded a substantial ransom, threatening to leak sensitive data if their demands are not met.

About Wintergreen Learning Materials

Established over 40 years ago, Wintergreen Learning Materials is a key player in the Canadian education sector, providing over 15,000 educational products, with more than 50% being exclusive to the company. Their offerings include active play materials, arts and crafts supplies, and innovative classroom furniture. With a clientele of over 50,000 publicly funded customers, including school boards, libraries, and hospitals, Wintergreen is renowned for its commitment to quality and customer service. The company employs approximately 35 to 50 people and reported an annual revenue of around $6.1 million.

Attack Overview

The ransomware attack on Wintergreen Learning Materials was executed by Hunters International, a group known for its sophisticated double extortion tactics. The attack led to the encryption of critical systems, causing operational disruptions. Wintergreen has engaged cybersecurity experts to assist in containment and recovery efforts and is cooperating with law enforcement agencies to investigate the breach. The company has not disclosed whether it intends to comply with the ransom demands.

Hunters International: A Notorious Ransomware Group

Hunters International emerged in October 2023, leveraging code from the defunct Hive ransomware group. As a Ransomware-as-a-Service (RaaS) operation, it has rapidly gained notoriety for its ability to bypass advanced security measures. The group employs double extortion tactics, combining data encryption with data theft, and has targeted industries such as healthcare, finance, and education. Their malware, developed in Rust, is highly adaptable, allowing for cross-platform attacks on Windows and Linux environments.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.