Eurotrol B.V. Hit by BlackSuit Ransomware, Disrupting Diagnostic Services

Incident Date: Jun 12, 2024

Attack Overview
VICTIM
Eurotrol B.V.
INDUSTRY
Healthcare Services
LOCATION
Netherlands
ATTACKER
Black Suit
FIRST REPORTED
June 12, 2024

Ransomware Attack on Eurotrol B.V. by BlackSuit

Overview of Eurotrol B.V.

Eurotrol B.V., headquartered in Ede, Gelderland, Netherlands, specializes in the development, production, and distribution of high-quality control materials for in vitro diagnostic (IVD) tests. Founded in 1988, the company employs 66 professionals and generates an annual revenue of approximately $10 million. Eurotrol's control solutions mimic human samples to ensure the accuracy and reliability of diagnostic tests in medical laboratories and hospitals. Their products are produced through an integrated ISO-approved process, ensuring high standards of quality and compliance.

Details of the Ransomware Attack

The company Eurotrol B.V. recently fell victim to a ransomware attack by the BlackSuit group. The attack was publicly claimed on BlackSuit's dark web leak site. The ransomware encrypted files on Eurotrol's systems, appending the .blacksuit extension and leaving a ransom note named README.BlackSuit.txt. The note directed Eurotrol to a Tor chat site for further communication with the attackers.

About BlackSuit Ransomware Group

BlackSuit is a new ransomware family that emerged in 2023, closely related to the notorious Royal ransomware group. It targets both Windows and Linux systems, including VMware ESXi servers. The high degree of similarity between BlackSuit and Royal ransomware suggests that BlackSuit may be a new variant developed by the same authors, a copycat, or an affiliate of the Royal ransomware gang. BlackSuit's ability to target critical infrastructure makes it a significant threat.

Potential Vulnerabilities and Attack Penetration

Eurotrol B.V.'s reliance on high-specification, custom-made quality control materials and their integration of key technologies such as JavaScript and HTML may have presented vulnerabilities that BlackSuit exploited. The ransomware group likely penetrated Eurotrol's systems through phishing attacks, exploiting software vulnerabilities, or leveraging weak security protocols. Given the critical nature of Eurotrol's services in the healthcare sector, the impact of this attack could be substantial, potentially disrupting diagnostic accuracy and patient care.

Sources

Disclaimer

The Halcyon Attacks Lookout Database is compiled using publicly available information based on the hosting choices of real-world threat actors and data from a variety of trackers. This information is provided in accordance with principles of fair use. Halcyon has made reasonable efforts to sanitize and verify the data; however, we do not guarantee the accuracy, completeness, or reliability of the information provided. Updates to the database are made as new source data becomes available from reputable sources.  By accessing, viewing, or using the information within the Halcyon Attacks Lookout Database, you acknowledge and agree to do so entirely at your own risk. No reliance should be placed upon the information for decision-making, and Halcyon disclaims all liability for any inaccuracies or omissions in the data.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.