New Termite Ransomware Linked to Blue Yonder Attack

Published:

spot_img

Emergence of Termite Ransomware: A Growing Threat to Supply Chains

New Ransomware Group “Termite” Targets Blue Yonder, Disrupts Supply Chain Operations

Last month, a significant ransomware attack on the supply chain management platform Blue Yonder has been linked to a newly emerged group known as "Termite." This cyber assault has severely impacted several downstream customers, particularly in the retail and manufacturing sectors, prompting Blue Yonder to work diligently to restore services.

According to researchers at Cyble, the Termite ransomware is essentially a rebranding of the infamous Babuk ransomware. So far, the group has claimed seven victims across multiple countries, including two each in the U.S. and France, and one each in Oman, Germany, and Canada. The attack highlights a growing trend of ransomware targeting supply chains, which can disrupt numerous businesses simultaneously.

Cyble’s analysis of the Termite ransomware reveals sophisticated tactics designed to maximize damage. Upon execution, the malware employs a method to ensure it is one of the last processes to be terminated during a system shutdown, allowing it ample time to encrypt files. It also disables critical services and deletes backup processes to hinder recovery efforts.

The ransomware’s malicious code further erases all Shadow Copies and empties the recycling bin, making file recovery nearly impossible. Victims are then directed to an onion site via a ransom note, where they are likely instructed on how to pay the ransom.

Cyble researchers warn that Termite represents a "new and growing threat" in the cyber landscape, employing advanced tactics such as double extortion to enhance its impact. This incident serves as a stark reminder of the vulnerabilities within software supply chains and the urgent need for robust cybersecurity measures to combat evolving threats.

spot_img

Related articles

Recent articles

CVE-2026-41940: Critical cPanel Authentication Bypass Risks Hosting Security

CVE-2026-41940: Critical cPanel Authentication Bypass Risks Hosting Security A newly identified security vulnerability, designated as CVE-2026-41940, has emerged as a significant threat within the web...

Redefining AI Performance Metrics in Security Operations Centers to Combat Evolving Threats

Redefining AI Performance Metrics in Security Operations Centers to Combat Evolving Threats The integration of artificial intelligence (AI) into Security Operations Centers (SOCs) is reshaping...

Minor Hotels Strengthens Presence in Egypt with Anantara Somabay Resort & Residences Signing

Minor Hotels Strengthens Presence in Egypt with Anantara Somabay Resort & Residences Signing In a significant development for the hospitality sector in Egypt, Minor Hotels...

Re-architecting Physical Security to Strengthen Resilience in Contested Environments

Re-architecting Physical Security to Strengthen Resilience in Contested Environments The landscape of physical security is undergoing a significant transformation, driven by evolving threats and technological...