Everest attacks SFK Group

Incident Date: Sep 02, 2023

Attack Overview
VICTIM
SKF Group
INDUSTRY
Manufacturing
LOCATION
Sweden
ATTACKER
Everest
FIRST REPORTED
September 2, 2023

The Everest Ransomware Gang Attacks SFK Group

The Everest ransomware gang has attacked SFK Group. SFK Group is a Swedish company that operates in the manufacturing and engineering sectors. With a strong presence in the Nordic region, SFK Group is known for its expertise in providing comprehensive solutions for industrial processes and manufacturing systems. The company specializes in various aspects of engineering, including automation, robotics, and machinery. SFK Group's offerings cater to a broad range of industries, including automotive, aerospace, and general manufacturing. They work closely with clients to design, develop, and implement tailored solutions that improve efficiency, enhance productivity, and optimize manufacturing processes.

Everest posted SFK Group to its data leak site on September 2nd but provided no further information. The Everest ransomware group has garnered attention by claiming possession of sensitive data from aeronautics firms, including NASA. While they haven't yet demanded ransom payments from victims, they've established a $30,000 price for the sale of leaked data. The group asserts access to corporate emails as an "intelligence opportunity."

Everest's Tactics and Targets

Targeting government offices across various states, including Argentina, Peru, and Brazil, the Russian-speaking Everest employs double extortion tactics, seeking payment for decryption keys and to prevent data leaks. Initially detected in 2018, the Everest ransomware is part of the Everbe 2.0 ransomware family, employing tools like Embrace, Hyena Locker, PainLocker, and EvilLocker.

Employing tactics like lateral movement through compromised accounts and exploiting the Remote Desktop Protocol, the group targets multiple industries, especially in the Americas, capital goods, health, and public sectors. The Everest group, distinctively rare, acts as an "Initial Access Broker," selling backdoors to other criminals. This shift in approach could be to evade law enforcement or explore new monetization avenues.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.