Content |
2024: US blames Russian Alexander Ryzhenkov for BitPaymer ransomware virus attacks
On October 1, 2024, the US Department of Justice announced that Russian Alexander Ryzhenkov was charged with using the BitPaymer ransomware virus to carry out attacks on American companies. It is associated with the cybercriminal groups Evil Corp and LockBit. Read more here.
2019: Attack by Spanish companies across the country
In early November 2019, targeted attacks virus extortioner disabled two Spanish companies on the same day: the large firm Everis, owned NTT Data Group and operated in the field of IT services and consulting, as well as the radio company Sociedad Española de Radiodifusión (Cadena SER). The hacker attack caused a real panic in, MEDIA as many companies remembered the epidemic. WannaCry A technical specialist at one company admitted to a Spanish television company: "We are ABC in real hysterics."
Some companies, including Spanish the airport operator, Aena have dropped a number of services as a precaution. In part, such a move was justified by close ties with Everis many Spanish corporations. According to experts, cyber security the used virus extortioner is a variant of the BitPaymer family of viruses. Previously, such viruses were used for a hacker attack on the French TV channel M6 and the German manufacturer of automation tools Pilz.
Spain's Department of National Security (DSN) reported the attack on the SER, but did not elaborate. "Following protocol in case of cyber attacks, SER shut down all of its operating computer systems," a DSN spokesperson said. The radio company continues to broadcast from Madrid, while technicians at local stations are working to restore the systems in collaboration with the Spanish National Institute of Cybersecurity (INCIBE).
Cadena SER has already released an official statement about the incident, but Everis has so far remained silent. Everis, which employs more than 24,500 employees in 18 countries, has suffered more, according to unofficial figures. The attack affected all branches of the company and it is assumed that the ransomware successfully spread through the internal network.[1]