The incident that occurred Sept. 8 and affected its EMEA IT systems seems to signal a return to business as usual for ransomware groups.
Japanese technology giant Olympus is currently investigating a cyber incident on its EMEA IT systems that happened earlier this month that sources said is the result of a BlackMatter ransomware attack.
The company detected āsuspicious activityā on Sept. 8 and āimmediately mobilized a specialized response team including forensics experts,ā according to a press statement released over the weekend.
āAs part of the investigation, we have suspended data transfers in the affected systems and have informed the relevant external partners,ā according to the statement. āWe are currently working to determine the extent of the issue and will continue to provide updates as new information becomes available.ā
Olympus, a multinational company with more than 31,600 employees worldwide, manufactures optical and digital reprography technology for the medical and life sciences industries. It was well known in the past as a pioneer in both analog and digital cameras, but sold off its struggling camera division in January.
It appears Olympus was the victim of the BlackMatter ransomware group, one of the cybercriminal organizations thatās risen to prominence after other purveyors of ransomware like DarkSide, Ā REvil and Ragnarok shut down operations, according to a report in TechCrunch.
Citing a person āfamiliar with the incident,ā the attack began in the early morning of Sept. 8, with BlackMatter claiming responsibility in a ransom note left on infected computers, according to the report.
āYour network is encrypted, and not currently operational,ā the note said, according to the report. āIf you pay, we will provide you the programs for decryption.ā
The group also included a web address to a site known to be used by BlackMatter to communicate with victims thatās accessible only through the Tor Browser, the report said.
Rising from the Ashes
BlackMatter operates as ransomware-as-a-service and rose from the ashes of DarkSideāa group perhaps best known for the takedown of Colonial Pipeline, which caused a major disruption in the oil and gas industry. In fact, some believe BlackMatter is merely a rebranding of the former ransomware gang than an entirely new group, said one security expert.
āThe adversary behaviors and tactics, techniques, and procedures (TTPs) seem to be very similar for DarkSide and BlackMatter,ā noted Jorge Orchilles, CTO of adversary-emulation security firm SCYTHE, in an email to Threatpost. āIt can be suggested that the threat actor simply changed their name and took a little break to distance themselves from the Colonial Pipeline breach.ā
REvil also had been laying low since a major supply-chain attack on Kaseya, but returned last week with its servers back online and a fresh victim listed on its site. A purported representative of the group also answered questions on an underground forum about why the REvil disappeared for a while and how its decryptor for the Kaseya attacks ended up online.
All of this recent activity is bad news for organizations who want to avoid being targeted for ransomware, which can cost organizations millions in remediation and fees back to unlock files, Orchilles noted.
āWhile it may seem we have had less ransomware attacks the past couple of months, we expect these types of double extorsionĀ ransomware attacks to continue at full force the remainder of the year,ā he said.
Indeed, the prospect of being hit by ransomware is something that keeps organizations āup at night,ā noted Saryu Nayyar, CEO of risk analytics firm Gurucul.
Though it seemed that the threat was waning for a while, the attack on Olympusāreminiscent of the Colonial Pipeline attackāshows that itās here to stay, which means companies need to shore up defenses, she said in an email to Threatpost.
āUntil enterprises can completely protect their systems from attack, the only early warning available is to monitor network activity in detail to detect anomalous activity, and rapidly track it down to close any security holes,ā Nayyar said. āIT teams and security professionals have to be constantly vigilant, but they also need the right tools for early detection and remediation.ā
Itās time to evolve threat hunting into a pursuit of adversaries.Ā JOINĀ Threatpost and Cybersixgill forĀ Threat Hunting to Catch Adversaries, Not Just Stop AttacksĀ and get a guided tour of the dark web and learn how to track threat actors before their next attack.Ā REGISTER NOWĀ for the LIVE discussion on Sept. 22 at 2 p.m. EST with Cybersixgillās Sumukh Tendulkar and Edan Cohen, along with independent researcher and vCISO Chris Roberts and Threatpost host Becky Bracken.