Industrial computer manufacturer Advantech Co. Ltd. has been hit with a ransomware attack, and those behind the attack are demanding a ransom of 750 bitcoin ($13.8 million).
Based in Taiwan, Advantech is the world’s largest supplier of industrial computers, with a 34% market share as of 2018. The company also manufactures network devices, servers, industrial “internet of things” devices and healthcare solutions.
The attack took place on Nov. 19, according to Taiwanese media with Bleeping Computer, which reported separately Saturday that it involved Conti ransomware. Those behind the Conti ransomware attack are said to have offered full data decryption and a promise to delete the data they had stolen if the ransom was paid with a threat to start releasing stolen data if payment was not made.
By Nov. 26, no payment had been made and those behind the attack released a 3.03-gigabyte archive of Advantech data that they claim was 2% of the total data they stole from the company on a leak site. The hackers again threatened to release more data if the ransom demand was not met.
Advantech confirmed the attack Nov. 26, saying that some of its servers were affected but recovery efforts were underway. The company said its systems were operating normally and orders, production and shipments had not been affected.
Conti ransomware was first detected in July and described at the time as containing unique features, notable among them offering faster encryption than other types of ransomware. Conti ransomware is also said to be a successor to the better-known Ryuk ransomware and was reported to be being deployed by TrickBot botnet-linked operations.
The ransomware is offered on a ransomware-as-a-service basis. Those behind the Conti ransomware allow other hackers to use the code either for a direct payment or for a share of any ransom payment made using the ransomware code.
Conti, along with Ryuk was named in an advisory from various U.S. government agencies Oct. 29 as being used to target hospitals and healthcare providers. Emphasizing the distribution method, the advisory noted that both forms of ransomware were being distributed by TrickBot and BazarLoader. TrickBot itself was incorrectly claimed by the media Oct. 12 to have been taken down by Microsoft Corp., but as noted at the time, Microsoft only said it had disrupted the bot.
Since you’re here …
Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!
Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.
… We’d also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.