Clop Ransomware Target Wrong U.K. Water Supplier

Share post:

Despite claims that 5T of data was breached and stolen from Thames Water, the UK’s largest water supplier, published data showed that the Clop ransomware had data from another water supplier.

The decision of the hackers to publish the data follows failed negotiations between the two parties involved. After Clop had revealed the stolen credentials, Thames Water interfered with the claims and noted that reports of Clop Ransomware, which violated its network, are nothing more than “cyber hoax” and that its operations are at full capacity.

A careful examination of the leaked showed spreadsheet and usernames and passwords that features South Staffordshire Water and South Staffordshire email addresses. Experts also revealed that one of the leaked documents sent to the attacked company was explicitly addressed to South Staffordshire PLC.

Therefore, it is very likely that Clop has misidentified their victim or that they are trying to extort a much larger company with false documents.

The ransomware gang, who realized their mistake, are now listing South Staffordshire Water as a victim on the extortion site.

South Staffordshire Water, which supplies 1.6 million consumers with 330 million litres of drinking water, has already confirmed a cyberattack that caused IT disruption.

The sources for this piece include an article in BleepingComputer.

SUBSCRIBE NOW

Related articles

Cyber Security Today, June 21, 2024 – US to ban Kaspersky for businesses, consumers

U.S. to ban the sale of Kaspersky products to consumers and businesses. Welcome to Cyber Security Today. It's Friday...

Biden administration to ban US sales of Kaspersky software over ties to Russia

The Biden administration is set to announce a ban on the sale of Kaspersky Lab's antivirus software in...

Security bug may allow anyone to spoof Microsoft employee emails

A security researcher claims to have discovered a bug that enables anyone to impersonate Microsoft corporate email accounts,...

Cyber Security Today, June 19, 2024 – How an attacker hid on an IT network for three years

How an attacker hid on an IT network for three years Welcome to Cyber Security Today. It's Wednesday June...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways