Security

Cyber-crime

SafePay ransomware gang claims Microlise attack that disrupted prison van tracking

Fledgling band of crooks says it stole 1.2 TB of data


The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its extortion demands before leaking data.

SafePay claims to have stolen 1.2 TB. Microlise, which offers vehicle tracking services and more to the likes of DHL and Serco – both of which were confirmed as collateral damage in Microlise's incident – told The Register that some of its data was stolen earlier this month.

We contacted the company for a response and confirmation that ransomware was involved in the incident, which until now has only been described as a "cyber incident," but it didn't immediately respond.

Microlise has issued two separate disclosures, the first of which came on October 31, saying it was making "substantial progress in containing and clearing the threat from its network."

Major customers reported issues soon after, including delivery giant DHL, which was unable to track its lorries, affecting deliveries to UK convenience stores operated by Nisa Group.

British security company Serco, which manages numerous public sector contracts, including with the Ministry of Justice, was also hit.

The company reported panic alarms and tracking systems used by prisoner transport vans were temporarily disabled, although service continued without disruption. No individuals in custody were unaccounted for.

Experts speaking to The Register at the time said the wording used by Microlise in its disclosure, coupled with the reports of disruptions by customers, suggested ransomware was indeed involved, although it wasn't confirmed explicitly.

A more recent update on the attack, which Microlise told the London Stock Exchange would be its final one concerning the matter, said some customers' systems remained offline, while many others had been restored.

"The company can now confirm that the vast majority of customer systems are back online, with some remaining customers conducting their own security verifications before enabling users," a statement read. "The company would like to reiterate no customer systems data was compromised."

Microlise went on to say that it was "continuing to assess the impact of the incident," but didn't foresee it having a material impact on its yearly financials.

"Once again, Microlise would like to thank customers for their patience and understanding over this challenging period," it added.

Not so safe to pay

SafePay is a new group on the scene. By the time researchers at Huntress got around to looking at it in October, it only had 22 victims logged on its leak blog.

Huntress's report on the group contains all the technical details and indicators of compromise needed for defenders to add to their detection rules.

However, in the two incidents the researchers investigated, SafePay used valid credentials to access victims' environments. They didn't establish persistence through the creation of new user accounts or by any other means either.

The first incident Huntress looked at involved the crims accessing an endpoint via RDP and disabling Windows Defender using the exact same sequence of LOLBin commands as previously seen during INC Ransomware attacks.

On day two of the attack, SafePay's cronies encrypted the victim's files within 15 minutes after stealing data the day before.

Given how new the group is to the cybercrime landscape, there is very little open source information about it or who's involved, although if its claim to the Microlise attack is genuine, it's quite the scalp to hold as it bursts onto the ransomware scene. ®

Send us news
3 Comments

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

UK floats ransomware payout ban for public sector

Stronger proposals may also see private sector applying for a payment 'license'

Ransomware attack forces Brit high school to shut doors

Students have work to complete at home in the meantime

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Atos denies Space Bears' ransomware claims – with a 'but'

Points finger at third-party infrastructure being breached

How cops taking down LockBit, ALPHV led to RansomHub's meteoric rise

Cut off one head, two more grow back in its place

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Drug addiction treatment service admits attackers stole sensitive patient data

Details of afflictions and care plastered online

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M

That's in addition to the $4.5M fine paid to three state AGs last year

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

IBM swoops in to rescue UK Emergency Services Network after Motorola shown the door

With a near half-billion-pound price hike bringing contract value to £1.4B