Researchers from threat intelligence firm Cyble reported that Nefilim ransomware operators allegedly targeted the Dussmann group, the German largest private multi-service provider. The Dussmann Group has over 64,500 employees in 22 countries, it is one of the largest private multi-service providers worldwide.
In the past months, the number of ransomware attacks spiked, numerous ransomware operators made the headlines targeting organizations worldwide. One of these crews is behind the Nefilim ransomware that recently targeted the mobile network operator Orange.
During its continuous darkweb and deepweb monitoring, the Cyble Research Team came across the post of Nefilim ransomware operators in which the crew claimed to have breached The Dussmann Group and have exfiltrated sensitive data.
Below the message published by Nefilim ransomware operators to announce the data breach:
Cyble Research Team analyzed the leaked files included in a first batch of documents released by the group. The first archive of files allegedly stolen by the company is around 15.7 GB in size, the ransomware operators leaked a total of 16,805 company’s files.
“The data leak seems to consist of corporate operational documents which include the company’s claim settlement documents, compulsory security mortgages documents, legal contracts, Cooperation and Project agreements, and much more.” reads the post published by Cyble.
The ransomware gang is now threatening the company of releasing other stolen data if it will not pay the ransom.
Below a list of tips provided by Cyble to prevent ransomware attacks:
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Nefilim ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
A vulnerability could allow recovery of the phone number associated with a Google account by…
Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…
SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…
Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai…
China-linked threat actor targeted over 70 global organizations, including governments and media, in cyber-espionage attacks…
This website uses cookies.