{"id":6583,"date":"2022-03-22T11:32:29","date_gmt":"2022-03-22T02:32:29","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=6583"},"modified":"2022-04-18T11:36:47","modified_gmt":"2022-04-18T02:36:47","slug":"it-systems-of-top-russian-meat-producer-miratorg-encrypted-by-threat-actors-using-the-windows-bitlocker-feature","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/it-systems-of-top-russian-meat-producer-miratorg-encrypted-by-threat-actors-using-the-windows-bitlocker-feature\/","title":{"rendered":"IT systems of top Russian meat producer, Miratorg encrypted by threat actors using the Windows BitLocker feature"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6583\" class=\"elementor elementor-6583\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-15aa4f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15aa4f0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f3187c6\" data-id=\"f3187c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-324c87a elementor-widget elementor-widget-text-editor\" data-id=\"324c87a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Thursday 17<sup>th<\/sup> of March 2022, an announcement by Rosselkhoznadzor, the Russian federal veterinary and phytosanitary supervision service revealed that Miratorg Agribusiness Holding, Moscow-based meat producer and distributor has experienced a cyberattack which resulted in their IT systems being encrypted using the Windows BitLocker feature to encrypt files and therefore having a similar impact of a ransomware attack. Rosselkhoznadzor stated in the announcement that the reason behind the attack appears to be sabotage and not financial as Miratorg is one of Russia&#8217;s largest and food suppliers. It is believed that the threat actors compromised Miratorg\u2019s systems by targeting and compromising system known as VetIS which is a state information system for organisations within the veterinary field.<\/p><p>Miratorg has published their own statement on the incident where they stated that they are already working towards resolving the impacts of the incident and restoring the normal functioning of the business. Miratorg also stated that the incident has not affected their supply and shipments to Russian citizens. Although Rosselkhoznadzor has assisted Miratorg in the hope of reducing the impact of the incident by temporarily lifting the strict documentation requirements for the movement of their products. Rosselkhoznadzor has also recommended all companies in Russia which are using VetIS to create backups of their files and databases on non-volatile media.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Thursday 17th of March 2022, an announcement by Rosselkhoznadzor, the Russian federal veterinary and phytosanitary supervision service revealed that Miratorg Agribusiness Holding, Moscow-based meat producer and distributor has experienced a cyberattack which resulted in their IT systems being encrypted using the Windows BitLocker feature to encrypt files and therefore having a similar impact of a ransomware attack. Rosselkhoznadzor stated<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":6588,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,7,1],"tags":[],"class_list":["post-6583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-by_country","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/04\/Picture1-1.jpg?fit=1375%2C842&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6583"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=6583"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6583\/revisions"}],"predecessor-version":[{"id":6591,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6583\/revisions\/6591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/6588"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=6583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=6583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=6583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}