Security

Cyber-crime

Schneider Electric ransomware crew demands $125k paid in baguettes

Hellcat crew claimed to have gained access via the company's Atlassian Jira system


Schneider Electric confirmed that it is investigating a breach as a ransomware group Hellcat claims to have stolen more than 40 GB of compressed data — and demanded the French multinational energy management company pay $125,000 in baguettes or else see its sensitive customer and operational information leaked.

And yes, you read that right: payment in baguettes. As in bread.

Schneider Electric declined to answer The Register's specific questions about the intrusion, including if the attackers really want $125,000 in baguettes or if they would settle for cryptocurrency. 

A spokesperson, however, emailed us the following statement:

"Schneider Electric is investigating a cybersecurity incident involving unauthorized access to one of our internal project execution tracking platforms which is hosted within an isolated environment. Our Global Incident Response team has been immediately mobilized to respond to the incident. Schneider Electric's products and services remain unaffected."

A ransomware crew called Hellcat claimed to have gained access to Schneider Electric's infrastructure via the $40-billion energy management giant's Atlassian Jira system. 

"This breach has compromised critical data, including projects, issues, and plugins, along with over 400,000 rows of user data, totaling more than 40GB Compressed Data," the criminals posted on their leak site.

The miscreants also promised to delete the data as long as the French firm hands over the dough. 

"Failure to meet this demand will result in the dissemination of the compromised information," they threatened. "Stating this breach will decrease the ransom by 50 percent, its [sic] your choice Olivier…"

"Olivier," we'd assume, is Olivier Blum, who, on Monday, was announced as Schneider's new CEO. This is the same day that Hellcat added the multinational to its site of shame, which doesn't make for a pleasant first week on the job.

Also on Monday, Hellcat leaked data that the group claimed belonged to Jordan's Ministry of Education and Tanzania's College of Business Education.

This is Schneider Electric's third breach in less than two years. In February, Cactus ransomware infected the corporation's Sustainability Business division. And in June 2023, the French giant was among the thousands of organizations and millions of individuals whose data was stolen by the CL0P ransomware crew in the MOVEit attacks. ®

Send us news
46 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more