The WarLock ransomware group has allegedly victimized Russian engineering firm okan.ru, exfiltrating sensitive financial data and threatening public release. The attack highlights the ongoing use of double-extortion tactics and exploitation of software vulnerabilities by modern RaaS groups. #WarLock #DoubleExtortion
Keypoints
- The WarLock ransomware group has targeted okan.ru, a Russian industrial valve supplier.
- The cybercriminals claim to have stolen sensitive financial information from the company.
- A countdown timer indicates the data will be leaked if the company does not pay the ransom.
- WarLock employs double-extortion tactics, encrypting files and stealing data to pressure victims.
- The group uses a ransomware-as-a-service model and exploits vulnerabilities in software like Microsoft SharePoint.
Read More: https://dailydarkweb.net/russian-engineering-firm-okan-allegedly-hit-by-warlock-ransomware/