The Nefilim ransomware operation has begun to publish unencrypted recordsdata stolen from a Dussmann Group subsidiary throughout a current assault.
The Dussmann Group is the biggest multi-service supplier in Germany with subsidiaries specializing in facility administration, company childcare, nursing and look after the aged, and enterprise programs options, together with HVAC, electrical work, and elevators.
The corporate has confirmed to BleepingComputer that one in all their subsidiaries, Dresdner Kühlanlagenbau GmbH (DKA), just lately suffered a ransomware assault the place knowledge was stolen.
Nefilim publishes DKA’s stolen knowledge
In the course of the DKA assault, the Nefilim operators declare to have stolen unencrypted recordsdata earlier than deploying the ransomware.
These stolen recordsdata are then used as leverage towards victims to coerce them to pay the ransom beneath the risk that the info will likely be publicly launched on ransomware knowledge leak websites.
In a put up to their knowledge leak web site yesterday, the Nefilim operators have printed two archives containing 14 GB price of stolen recordsdata.
In keeping with the file lists, these archives comprise quite a few paperwork, together with Phrase paperwork, photos, accounting paperwork, and AutoCAD drawings.

After studying concerning the knowledge leak, BleepingComputer contacted Dussmann Group, who confirmed that their subsidiary, DKA, was breached and recordsdata had been stolen.
“The refrigeration specialist, Dresdner Kühlanlagenbau GmbH (DKA) with 570 staff has been the goal of a cyber assault throughout which knowledge was encrypted and copied. DKA is a subsidiary of the Dussmann Group. The servers had been shut down as a precaution. The information safety authorities and the State Workplace of Felony Investigation in Saxony have been knowledgeable and fees have been filed.”
“DKA is in shut communication with the authorities and exterior cyber-security specialists. Operational processes within the enterprise unit for refrigeration air-conditioning plant engineering are safe. DKA has already knowledgeable purchasers and staff concerning the cyber-attack and the info outflow. Attributable to ongoing investigations, we can’t say extra at current,” Michaela Mehls, Dussmann Group’s Head of Company Communications, informed BleepingComputer.
The Nefilim ransomware operators have informed BleepingComputer that they encrypted 4 domains and stole roughly 200GB of archives.
It isn’t identified how the Nefilim operators gained entry to DKA’s community, and cyber intelligence agency Unhealthy Packets was unable to search out any weak VPN gateways or gadgets situated on their community.
With uncovered distant desktop servers estimated to be accountable for 70-80% of all community breaches, the attackers doubtless gained entry by an uncovered server or a phishing assault.
Defending towards ransomware assaults
To guard a community from being breached in ransomware assaults, directors want a layered method to securing their system.
With community breaches generally be performed by way of uncovered distant desktop companies, it’s important to verify all RDP servers are solely accessible over an organization VPN.
Ransomware operations generally goal VPN gateways and gadgets to achieve entry to company and authorities networks.
With VPN gateways now uncovered, they too have to be hardened and secured with the most recent safety updates and firmware obtainable.
Lastly, MFA ought to be enabled for company accounts, and Home windows occasion logs ought to be monitored for uncommon entries.
Microsoft has offered a abstract on easy methods to mitigate human-operated ransomware assaults that each one system directors ought to change into acquainted with.