BeInNews Academy Ltd © Street: Suite 1701 – 02A, 17/F, 625 King’s Road, North Point. Hong Kong.
The Toll Group, a transport and logistics firm based out of Australia, has been hit by a suspected ransomware attack that has left the firm unable to fulfill its delivery operations and stranded its customers.
Toll Group shuts down IT systems in response to 'cybersecurity incident' https://t.co/iZkRVKGXWE
— ZDNet (@ZDNet) February 5, 2020
The firm confirmed the attack in an official press release, stating that it chose to safeguard its data by shutting down several systems across various sites.
“Toll IT teams are working closely with global cybersecurity experts to resolve the issue” and “making progress with our recovery activities to restore our systems and Toll customer-facing applications,” the release explained.
The Australian firm, which employs over 40,000 people and maintains operations across the world, abruptly shut down its customer-facing IT systems late last week, claiming in a tweet at the time that it was merely doing it in response to a “cyber incident.”
In one of the updates, the firm confirmed that the ransomware used in the attack was a variant of the Mailto ransomware. The firm claimed that it had affected up to 1000 of its servers. Toll Group said it had shared necessary information with law enforcement agencies, and it hopes to restore operations back to normalcy soon.
2/2 … As we continue to make progress in restoring customer facing applications and services in the coming days, we will provide further advice on expected timeframes. We will continue to provide regular updates. We sincerely apologise for any inconvenience caused.
— Toll Group (@Toll_Group) February 3, 2020
Customers had been complaining about the slow delivery timelines on their packages. To appease users, Toll craved their indulgence as it was now using manual processes to fulfill deliveries.
Operations in the Philippines, Australia, and India are reported to have been hit the hardest. However, it confirmed that many of its customers will still be able to access most of its services across large parts of its network around the world.
Also known as Kokoklock, the Mailto ransomware attaches random extensions to file names, essentially making them unusable. It was first spotted in September 2019, and while it doesn’t share many features with other deadly ransomware, its singular purpose is to extort money from its victims.
Once in a system, the ransomware looks for every file format and encrypts them. Using a Salsa20 cipher, the ransomware attaches a random appendix to data that usually consists of six characters. A random note is also dropped, which advises victims to send an email to a specified address to get their files back.
The attackers usually ask for payments to be made in cryptocurrency, although the exact amount could vary between victims.
Images are courtesy of Twitter, Shutterstock, Pixabay.
Do you need trading guidance during this Coronavirus outbreak? BeInCrypto is here to help! Join our Telegram Trading Community for Market Updates, exclusive Trading Signals and a FREE Trading Course! Images courtesy of Shutterstock, Trading View and Twitter.