New Termite Ransomware Linked to Blue Yonder Attack

Published:

spot_img

Emergence of Termite Ransomware: A Growing Threat to Supply Chains

New Ransomware Group “Termite” Targets Blue Yonder, Disrupts Supply Chain Operations

Last month, a significant ransomware attack on the supply chain management platform Blue Yonder has been linked to a newly emerged group known as "Termite." This cyber assault has severely impacted several downstream customers, particularly in the retail and manufacturing sectors, prompting Blue Yonder to work diligently to restore services.

According to researchers at Cyble, the Termite ransomware is essentially a rebranding of the infamous Babuk ransomware. So far, the group has claimed seven victims across multiple countries, including two each in the U.S. and France, and one each in Oman, Germany, and Canada. The attack highlights a growing trend of ransomware targeting supply chains, which can disrupt numerous businesses simultaneously.

Cyble’s analysis of the Termite ransomware reveals sophisticated tactics designed to maximize damage. Upon execution, the malware employs a method to ensure it is one of the last processes to be terminated during a system shutdown, allowing it ample time to encrypt files. It also disables critical services and deletes backup processes to hinder recovery efforts.

The ransomware’s malicious code further erases all Shadow Copies and empties the recycling bin, making file recovery nearly impossible. Victims are then directed to an onion site via a ransom note, where they are likely instructed on how to pay the ransom.

Cyble researchers warn that Termite represents a "new and growing threat" in the cyber landscape, employing advanced tactics such as double extortion to enhance its impact. This incident serves as a stark reminder of the vulnerabilities within software supply chains and the urgent need for robust cybersecurity measures to combat evolving threats.

spot_img

Related articles

Recent articles

Iranian and Egyptian Foreign Ministers Discuss Key Issues in Phone Call

Iran and Egypt Celebrate Eid al-Adha with Diplomatic Dialogue A Warm Exchange of Greetings In a significant diplomatic interaction, Iranian Foreign Minister Seyed Abbas Araghchi and...

Malicious Browser Extensions Infect 722 Users in Latin America Since Early 2025

Emerging Cyber Threat: Malicious Extension Targets Brazilian Users Cybersecurity experts have recently uncovered a concerning campaign aimed at users in Brazil, which has been ongoing...

Searchlight Cyber Aids U.S. Government in Dismantling BidenCash Dark Web Marketplace

U.S. Law Enforcement Takes Down BidenCash Dark Web Marketplace Overview of the Operation In a significant law enforcement effort announced by the U.S. Department of Justice,...

Report: Stolen Credentials Are the Top Entry Point for Hackers

Stolen Credentials: The Most Common Gateway for Cyber Intrusions In the realm of cybersecurity, keeping networks secure is paramount. A recent analysis by the cybersecurity...