therecord.media Open in urlscan Pro
2606:4700:4400::6812:20b5  Public Scan

URL: https://therecord.media/german-national-bar-association-investigating-cyberattack
Submission: On August 24 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept

 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go


SUBSCRIBE TO THE RECORD

Subscribe

The Federal Administrative Court in Leipzig, Germany. Credit: bverwg.de
Jonathan GreigAugust 18th, 2023
 * News
 * Industry
 * Cybercrime

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


GERMANY’S NATIONAL BAR ASSOCIATION INVESTIGATING RANSOMWARE ATTACK

A bar association representing German lawyers nationwide is investigating a
cyberattack on its office in Brussels.

The German Federal Bar (BRAK) Association discovered the attack on August 2. The
group is an umbrella organization overseeing 28 regional bars across Germany and
representing about 166,000 lawyers nationally and internationally.

On Monday, the NoEscape ransomware group claimed it attacked the organization
after BRAK announced last week that it was investigating a cyberattack. The
organization did not respond to requests for an update on the situation, instead
referring Recorded Future News to last week’s news release.



In the statement they said they were working with a forensic firm to investigate
the ransomware attack, which was discovered on August 2, on its Brussels office.
They have been able to restore access to their email system and plan to contact
anyone who had data accessed during the incident.

“The Brussels office… fell victim to a criminal cyberattack, which led to a
failure of the IT systems,” they wrote. Once discovered, “all network
connections were immediately severed.”

“BRAK is currently working with an external service provider for IT security on
a forensic analysis of the IT systems in order to clarify the incident and
repair the damage… BRAK reported the incident to the Federal Commissioner for
Data Protection and is in contact with the Belgian police, the Berlin State
Criminal Police Office and the Cyber Emergency Response Team of the Belgian
Center for Cyber Security,” they added.

The hackers encrypted BRAK’s mail server and exfiltrated 160 gigabytes of data.
The organization is still trying to figure out how much information was taken
involving communications from people contacting the Brussels office. The
organization is operating under the assumption that such information was leaked.

The organization runs a special email service for lawyers but said that mailbox
is on a completely separate system.

Officials said the ransomware gang threatened to leak what it stole and were
told to contact the cybercriminals for more information.

BRAK warned that people should be wary of any emails referencing or purporting
to come from the organization — particularly any requests for bank account
informationn.

“The resumption of normal operations is being prepared,” they said.

NoEscape, which is also stylized as N0_Esc4pe, made waves in June and July after
forcing Hawaiʻi Community College to pay a ransom following an attack.

Recorded Future ransomware expert Allan Liska said previously that NoEscape was
first seen in May, when it advertised its services on the cybercriminal forum
RAMP. The Record is an independent editorial unit of Recorded Future.

NoEscape’s ransomware is “not based on previous/stolen source code and it is
written in C++,” he said.

“Despite being relatively new, they have already hit at least half a dozen
victims including a hospital in Belgium, a manufacturing company in the US and
another manufacturing company in the Netherlands,” Liska added.

 * 
 * 
 * 
 * 
 * 

Tags
 * law
 * Germany
 * Ransomware


JONATHAN GREIG



Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has
worked across the globe as a journalist since 2014. Before moving back to New
York City, he worked for news outlets in South Africa, Jordan and Cambodia. He
previously covered cybersecurity at ZDNet and TechRepublic.

Previous articleNext article
Ransomware gang threatens Raleigh Housing Authority months after devastating
attack
FBI, Air Force warn of cyberattacks on space industry by ‘foreign intelligence
operations’

 * Proposed bill would require vulnerability disclosure policies for all federal
   contractorsAugust 24th, 2023
 * MacOS version of info-stealing XLoader gets an upgradeAugust 22nd, 2023
 * Cyberattack on Belgian social service centers forces them to closeAugust
   22nd, 2023
 * Ukrainian hackers claim to leak emails of Russian parliament deputy
   chiefAugust 22nd, 2023
 * Ecuador’s national election agency says cyberattacks caused absentee voting
   issuesAugust 21st, 2023
 * Somalia bans TikTok, Telegram over ‘horrific' contentAugust 21st, 2023
 * Tesla blames data breach affecting 75,000 on ‘insider wrongdoing’August 21st,
   2023
 * Australia’s .au domain administrator denies data breach after ransomware
   postingAugust 20th, 2023
 * Illinois hospital notifies patients, employees of data breach after Royal
   gang postingAugust 18th, 2023


H1 2023: RANSOMWARE'S PIVOT TO LINUX AND VULNERABLE DRIVERS


H1 2023: Ransomware's Pivot to Linux and Vulnerable Drivers


THREAT ACTORS LEVERAGE INTERNET SERVICES TO ENHANCE DATA THEFT AND WEAKEN
SECURITY DEFENSES


Threat Actors Leverage Internet Services to Enhance Data Theft and Weaken
Security Defenses


REDHOTEL: A PROLIFIC, CHINESE STATE-SPONSORED GROUP OPERATING AT A GLOBAL SCALE


RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale


BLUECHARLIE, PREVIOUSLY TRACKED AS TAG-53, CONTINUES TO DEPLOY NEW
INFRASTRUCTURE IN 2023


BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New
Infrastructure in 2023


BLUEBRAVO ADAPTS TO TARGET DIPLOMATIC ENTITIES WITH GRAPHICALPROTON MALWARE


BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News