Security

Cyber-crime

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking

Fledgling band of crooks says it stole 1.2 TB of data


The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion demands before leaking data.

SafePay claims to have stolen 1.2 TB. Microlise, which offers vehicle tracking services and more to the likes of DHL and Serco – both of which were confirmed as collateral damage in Microlise's incident – told The Register that some of its data was stolen earlier this month.

We contacted the company for a response and confirmation that ransomware was involved in the incident, which until now has only been described as a "cyber incident," but it didn't immediately respond.

Microlise has issued two separate disclosures, the first of which came on October 31, saying it was making "substantial progress in containing and clearing the threat from its network."

Major customers reported issues soon after, including delivery giant DHL, which was unable to track its lorries, affecting deliveries to UK convenience stores operated by Nisa Group.

British security company Serco, which manages numerous public sector contracts, including with the Ministry of Justice, was also hit.

The company reported panic alarms and tracking systems used by prisoner transport vans were temporarily disabled, although service continued without disruption. No individuals in custody were unaccounted for.

Experts speaking to The Register at the time said the wording used by Microlise in its disclosure, coupled with the reports of disruptions by customers, suggested ransomware was indeed involved, although it wasn't confirmed explicitly.

A more recent update on the attack, which Microlise told the London Stock Exchange would be its final one concerning the matter, said some customers' systems remained offline, while many others had been restored.

"The company can now confirm that the vast majority of customer systems are back online, with some remaining customers conducting their own security verifications before enabling users," a statement read. "The company would like to reiterate no customer systems data was compromised."

Microlise went on to say that it was "continuing to assess the impact of the incident," but didn't foresee it having a material impact on its yearly financials.

"Once again, Microlise would like to thank customers for their patience and understanding over this challenging period," it added.

Not so safe to pay

SafePay is a new group on the scene. By the time researchers at Huntress got around to looking at it in October, it only had 22 victims logged on its leak blog.

Huntress's report on the group contains all the technical details and indicators of compromise needed for defenders to add to their detection rules.

However, in the two incidents the researchers investigated, SafePay used valid credentials to access victims' environments. They didn't establish persistence through the creation of new user accounts or by any other means either.

The first incident Huntress looked at involved the crims accessing an endpoint via RDP and disabling Windows Defender using the exact same sequence of LOLBin commands as previously seen during INC Ransomware attacks.

On day two of the attack, SafePay's cronies encrypted the victim's files within 15 minutes after stealing data the day before.

Given how new the group is to the cybercrime landscape, there is very little open source information about it or who's involved, although if its claim to the Microlise attack is genuine, it's quite the scalp to hold as it bursts onto the ransomware scene. ®

Send us news
3 Comments

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Russia arrests one of its own – a cybercrime suspect on FBI's most wanted list

The latest in an unusual change of fortune for group once protected by the Kremlin

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

We told Post Office about system problems at the highest level, Fujitsu tells Horizon Inquiry

State-owned retail company was not subordinate to Japanese multinational in technical matters, legal rep says

BT Group confirms attackers tried to break into Conferencing division

Sensitive data allegedly stolen from US subsidiary following Black Basta post

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting