Ransomware attacks have been on the rise in recent months, likely due to the ease with which hackers can generate substantial earnings through increasingly aggressive tactics, including double and triple extortion. These methods force victims to not only pay a ransom to regain access to their systems but also to prevent the public release of stolen data.
A recent high-profile case involves Cell C, South Africa’s fourth-largest mobile network operator, which has confirmed it fell victim to a ransomware attack resulting in significant data theft.
According to Cell C, the attack was carried out by RansomHouse, a relatively new cybercriminal group known for distributing file-encrypting malware. The hackers allegedly exfiltrated about 2TB of data from Cell C, which includes sensitive information belonging to approximately 7.7 million customers.
Details on the full scope of the breach are still scarce, and it remains unclear exactly what type of information was stolen. However, a source within the company, speaking anonymously, indicated that the attackers gained access to a variety of sensitive customer data, including full names, contact information, ID numbers, banking details, driving license numbers, medical records, and passport information.
What remains puzzling is why a telecom provider would store medical information, as it has no clear relevance to its core business.
The stolen data could potentially be used for a range of malicious activities, including phishing attacks and identity theft. In response, Cell C has taken steps to mitigate the damage, bringing in international cybersecurity experts to address the situation and counteract RansomHouse’s actions with technical precision.
RansomHouse, which has been active since March 2022, is primarily focused on data exfiltration rather than encrypting victim databases. The group claims it is exposing IT vulnerabilities in corporate systems and positions itself as a “Force for Good,” though its demand for a hefty ransom contradicts this message.
Ad
Join our LinkedIn group Information Security Community!