Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager

Share This Post

The Play ransomware gang has released data allegedly stolen from Dutch maritime logistics services company Royal Dirkzwager.

Founded in 1872, the company provides ship management services to hundreds of organizations in the maritime industry, including monitoring of incoming and outgoing vessel traffic in ports, emergency response services, and more.

Royal Dirkzwager fell victim to the cyberattack on March 6, being forced to take systems offline and suspend several services.

While restoration operations started immediately, the company needed roughly a week before being able to clean and fully restore its systems and resume the first services.

At the beginning of last week, Royal Dirkzwager confirmed that it fell victim to a ransomware attack, without providing specific details on the matter.

On March 16, the company announced that almost all services were fully functional, and that it was addressing the last issues.

On the same day, however, the Play ransomware gang published on its Tor leak site a 5 Gb archive containing data allegedly stolen from the maritime services company.

The archive, the ransomware operators say, includes both private and personal data, contracts, employee IDs, passports, and more, but they claim it represents only a portion of the data that was exfiltrated from Royal Dirkzwager’s systems.

The cybercriminals also threaten to publish the full batch of data if Royal Dirkzwager does not respond to their demands.

Also referred to as PlayCrypt, the Play ransomware was first spotted in June 2022, but has become one of the most active ransomware families recently.

In February 2023, the Play gang made seven victims, but has already claimed 13 attacks since the beginning of March, data from deep web intelligence project DarkFeed shows. In January, the criminal enterprise was the fifth most active ransomware group.

SecurityWeek has emailed Royal Dirkzwager for additional information on the attack, but has received no response.

Related: Play Ransomware Group Claims Attack on A10 Networks

Related:Play Ransomware Group Used New Exploitation Method in Rackspace Attack

Related: US Government Warns Organizations of LockBit 3.0 Ransomware Attacks

SecurityWeek RSS Feed

Read More

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.

Article

BFU – Seeing is Believing

Oh no, the device is in BFU. This is the common reaction; a device needs extracting, and you find it in a BFU state. Often, there’s an assumption that a BFU extraction will only acquire basic information, but that isn’t always the case.