{"id":7297,"date":"2022-08-16T17:13:47","date_gmt":"2022-08-16T08:13:47","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7297"},"modified":"2022-10-13T17:21:21","modified_gmt":"2022-10-13T08:21:21","slug":"clop-ransomware-group-attacked-uk-water-supplier-but-extorted-the-wrong-company","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/clop-ransomware-group-attacked-uk-water-supplier-but-extorted-the-wrong-company\/","title":{"rendered":"Clop ransomware group attacked UK water supplier but extorted the wrong company"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7297\" class=\"elementor elementor-7297\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9106b35 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9106b35\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8509108\" data-id=\"8509108\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ec61bc6 elementor-widget elementor-widget-text-editor\" data-id=\"ec61bc6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Monday 15th of August 2022, South Staffordshire confirmed that they had experienced IT disruption from a cyberattack. The released announcement explained that the safety and water distribution systems are still operational and therefore there is no impact on the supply of safe water to its customers or those of its subsidiaries, Cambridge Water and South Staffs Water.<\/p><p>\u201cThis is thanks to the robust systems and controls over water supply and quality we have in place at all times, as well as the quick work of our teams to respond to this incident and implement the additional measures we have put in place on a precautionary basis,\u201d &#8211; South Staffordshire announcement.<\/p><p>Although South Staffordshire\u2019s announcement was released following the announcement by the Clop ransomware gang that claimed Thames Water as their victim where they stated they allegedly had accessed the SCADA systems which they could manipulate to cause harm to 15 million customers. The announcement also stated they had allegedly stolen 5TB from the compromised systems.<\/p><p>Although, after the ransomware group published the first sample of stolen data following a supposed collapse in the negotiations of the ransom payment, Thames Water officially disputed the claims by Clop. The released statement by Thames Water stated that the reports of Clop having breached its network were &#8220;cyber-hoax&#8221; and that its operations are at full capacity.<\/p><p>It was later revealed that Clop had possibly misidentified the victim based on the leaked stolen data that included passports, screenshots from water treatment SCADA systems, and driver\u2019s licenses, the data contained mentions of South Staff Water and South Staffordshire.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Monday 15th of August 2022, South Staffordshire confirmed that they had experienced IT disruption from a cyberattack. The released announcement explained that the safety and water distribution systems are still operational and therefore there is no impact on the supply of safe water to its customers or those of its subsidiaries, Cambridge Water and South Staffs Water. \u201cThis is<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7302,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,9,2,7,8,1],"tags":[],"class_list":["post-7297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-read_article","category-ransomware_criminals","category-ce_news","category-by_country","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/10\/Picture1.jpg?fit=1378%2C919&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7297"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7297"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7297\/revisions"}],"predecessor-version":[{"id":7305,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7297\/revisions\/7305"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7302"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}