Energy supplier Entega hacked – data is on the dark web

B2B Cyber ​​Security ShortNews

Share post

ENTEGA IT subsidiary COUNT+CARE GmbH & Co. KG was attacked back in June, the system data was encrypted with ransomware and a lot of customer data was stolen. According to Entega, a ransom in the high tens of millions was demanded, which was not paid. Well, in July 2022, much of the customer data can be found on the dark web, as threatened. According to experts, the APT group "Black Cat" is at work here.

Cyber ​​criminals who attacked the ENTEGA IT subsidiary COUNT+CARE GmbH & Co. KG on the second weekend in June placed personal data from ENTEGA customers, employees and business partners on the so-called dark web. According to the current state of knowledge, the criminal publication of the data affects a large number of customers of ENTEGA and its subsidiaries, whose names, addresses and consumption data are affected.

Lots of Entega customer data on the dark web

“We deeply regret this incident. Together with the investigating authorities, we have done everything we can since the beginning of the criminal attack to clear up the incident and quickly make the affected systems functional again," says ENTEGA company spokesman Michael Ortmanns. Currently, it is still being evaluated at high pressure which data was stolen.

"We will immediately provide all information about the criminal attack and its consequences on our website," said the spokesman. COUNT+CARE, a subsidiary of ENTEGA AG, fell victim to a cyber attack in June. Among other things, the company's websites and customer portals were blocked. The affected IT systems were immediately isolated and secured, and an investigation by external IT specialists was initiated. ENTEGA immediately informed the responsible data protection and security authorities.

Critical infrastructure (KRITIS) not affected

At no time was there any danger to the so-called critical infrastructure – i.e. the gas, electricity, water and district heating networks operated by ENTEGA and its subsidiaries. "There was no risk of power, water, gas or heat failures," said ENTEGA spokesman Michael Ortmanns.

The damage caused by the cybercriminals has now been largely repaired. The websites and customer portals of ENTEGA can be accessed normally again. Extensive measures have been taken to protect those affected as comprehensively as possible. These include, among other things, resetting the password when accessing meineentega.de online. ENTEGA asks customers to be vigilant regarding suspicious letters, emails, phone calls (mobile/landline), text messages or other unusual activity, particularly on online accounts, including meineentega.de.

Bank details and passwords published

The bank details of some customers were also published. Those affected will be informed individually by ENTEGA. ENTEGA asks these customers in particular to check their bank accounts regularly and, if necessary, to change the passwords used for online banking. However, the company points out that due to the Europe-wide binding two-factor authentication for online banking, the risk of unauthorized transfers is low. There is also a risk of criminal use of the data for the other parties involved. In individual cases, it could happen that those affected receive more spam mails or unsolicited advertising calls in the future. Entega provides further information for customers and a hotline on its website.

More at ENTEGA.ag

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more