Is Continental a victim of LockBit?

B2B Cyber ​​Security ShortNews

Share post

While Continental already spoke in a statement on its website in August 2022 that the attack had been repelled, the ransomware group LockBit announced on its leak page that data captured by Continental had been published. According to the chat log, apparently 40 terabytes of data. 

The APT group LockBit claims that it has successfully hacked and stolen data from the automotive supplier Continental. Now the data is to be published on the leak page, probably to increase the pressure on Continental. However, Continental has not published any information on a current attack. According to the chat log on the LockBit leak page, it is apparently about 40 terabytes of data.

Old or new attack on Continental?

🔎 The LockBit leak page shows that the Continental data will probably be released.

On the website is only one release from August to be found with the title "Continental informs about averted cyber attack". The following text clearly states that “As part of a cyber attack, attackers have infiltrated parts of Continental's IT systems. The company identified this itself at the beginning of August and then averted it. Continental's business activities were never affected. The technology company has full control of its IT systems. According to the current state of knowledge, there is no impairment of the IT systems of third parties."

If you believe this statement, then LockBit cannot have captured any data. However, LockBit is not known for bluffs, but repeatedly publishes data from victims who are unwilling to pay. The gang has not yet released details about what data they exfiltrated from Continental's network or when the breach took place.

Since the counter on the LockBit leak page has expired, the entry “All available data published !” can now be found. If this is really the case, the data will soon appear for evaluation.

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more