FOOD Iowa farm services provider hit with BlackMatter ransomware and $5.9 million ransom

Jubilee on Earth

Veteran Member
Iowa farm services provider hit with BlackMatter ransomware and $5.9 million ransom

Security researchers leaked conversations between New Cooperative negotiators and BlackMatter operators.


By Jonathan Greig | September 20, 2021 | Topic: Security

New Cooperative -- an Iowa-based farm service provider -- has been hit with a ransomware attack, continuing a streak of incidents affecting agricultural companies this year.

The company did not respond to requests for comment but confirmed to Bloomberg News that it was suffering from a "cybersecurity incident" that impacted some of its devices and systems. It told Bloomberg reporters that it took systems offline to "contain the threat."

Ransomware expert Allan Liska shared screenshots of the BlackMatter ransomware leak page with ZDNet, showing the group had troves of financial documents, network information for multiple companies involved with New Cooperative, the social security numbers and personal information for employees, R&D files and the source code for a farmer technology platform called Soil Map.

The ransomware group claims to have 1,000GB of data and has set a timer that they say expires at noon on September 25.

Liska confirmed that other documents show BlackMatter is demanding a $5.9 million ransom.

On social media, multiple security researchers leaked chats between negotiators for New Cooperative and BlackMatter operators.

Representatives for New Cooperative repeatedly say they are part of the much-discussed "16 critical sectors" that US President Joe Biden said was off-limits to ransomware actors in conversations with Russian President Vladimir Putin.

In addition to saying it was part of the country's critical infrastructure, the company noted that there would be "public disruption" to the grain, pork and chicken supply chain if it is not back up and running soon.

The BlackMatter threat actors refuse to back down, saying only financial losses will be incurred from the attack. The chats also show that New Cooperative said it would have no choice but to contact CISA if it is not back up and running within the next 12 hours.

CISA did not respond to requests for comment, but the company told multiple outlets that law enforcement had already been contacted.

Reuters reported that the cooperative is involved in a variety of aspects of the grain business, including running grain storage elevators, selling fertilizer, buying from farmers and providing technology to farmers.

Don Roose, president of US Commodities in West Des Moines, Iowa, told the outlet that this was an especially important week for farmers because this is when harvests begin to ramp up, particularly for crops like soybeans. According to Bloomberg, New Cooperative said it is working with its customers to get grain to animals while it tries to restore its systems.

Despite the warnings from the White House, ransomware groups have not stopped their attacks on the agriculture industry. Earlier this month, the FBI released a notice warning companies in the food and agriculture sector to watch out for ransomware attacks aiming to disrupt supply chains.

"Food and agriculture businesses victimized by ransomware suffer significant financial loss resulting from ransom payments, loss of productivity, and remediation costs. Companies may also experience the loss of proprietary information and personally identifiable information and may suffer reputational damage resulting from a ransomware attack," the FBI said.

The notice goes on to list multiple attacks on the food and agriculture sector since November, including a Sodinokibi/REvil ransomware attack on a US bakery company, the attack on global meat processor JBS in May, a March 2021 attack on a US beverage company and a January attack on a US farm that caused losses of approximately $9 million.

JBS ended up paying an $11 million ransomto the REvil ransomware group after the attack caused meat shortages across the US, Australia and other countries. In November, the FBI also cited an attack on a US-based international food and agriculture business that was hit with a $40 million ransom demand from the OnePercent Group. The company was able to recover from backups and did not pay the ransom.

Former CIA cyber official Marcus Fowler told ZDNet that the attack on New Cooperative is the fourth crippling and high-profile attack on US critical infrastructure in recent months.

Fowler noted that while the Biden Administration can aspire for certain sectors to be off-limits from hackers, significant parts of the US' infrastructure and businesses are interconnected, making it nearly impossible to separate critical from non-critical industries.

"What's more, if BlackMatter truly is DarkSide 2.0, then this is evidence that the President's talks and warnings have had little impact. Based on the details currently available, there are striking parallels between this attack and the recent campaigns against Colonial Pipeline and JBS," said Fowler, who is now director of strategic threat at cyber firm Darktrace.

"Just like in these instances, New Cooperative took their operational technology (OT) systems offline as a precautionary measure to an IT side attack. We still need to get better at securing OT."

Jake Williams CTO at BreachQuest, noted that BlackMatter appears to be a spinoff of the REvil group and has been actively recruiting for initial accesses into victim networks in recent months. But others, like Lookout senior manager Hank Schless, said BlackMatter appears to be associated with DarkSide, the group behind the attack on Colonial Pipeline.

Other experts said ransomware groups were ignoring the warnings of law enforcement because of how lucrative and costly ransomware attacks are on companies in the agriculture industry.

"Companies working in the agricultural sector are particularly susceptible to ransomware activity as the harvest and fertilization of crops is highly sensitive to external factors; this typically involves weather changes and time of the year, however any delays caused by a ransomware attack could result in a significant loss of productivity and in turn lead to huge amounts of crops being wasted," said said Chris Morgan, senior cyber threat intelligence analyst at Digital Shadows.

"The attack also comes at a time where COVID has resulted in a global shortages of truck drivers, which is impacting food supply chains."
Curtis Simpson, CISO at Armis, added that the food and agriculture industry is heavily reliant upon connected machinery to power key aspects of the business.

These connected machines are growing targets for bad actors due to most companies' limited visibility into risks and threats impacting these assets, their overall level of exposure to attacks (including through the exploitation of connected machines), and the high likelihood of being paid a ransom if the attack even approaches, let alone impacts, machine-driven operations.

"Much of the food and agriculture supply chain is also enabled by small operations. Some of these operations were already strained by the pandemic and any such attack could simply knock them out of business for good. Once again, as this happens, downstream operations ranging from foodservice providers to restaurants to hospitals and consumers will all have issues sourcing products," Simpson said.
 

20Gauge

TB Fanatic

The U.S. grain, pork and chicken supply could be at risk after a ransomware attack on New Cooperative Inc. has forced the Iowa-based agriculture services provider's systems to go offline.

"Out of an abundance of caution, we have proactively taken our systems offline to contain the threat, and we can confirm it has been successfully contained," a New Cooperative spokesperson told the Wall Street Journal.

A spokesperson for New Cooperative did not immediately return FOX Business' request for comment.


Security researchers say the attack was carried out by ransomware group BlackMatter, which has reportedly encrypted New Cooperative’s data and stolen 1,000 gigabytes worth of files, including invoices, research and development documents, and the source code to its soil-mapping technology. The hacking group is asking for a $5.9 million ransom payment in exchange for a tool to decrypt the data.

According to screenshots shared by DarkFeed Threat Intelligence of what appears to be a conversation between BlackMatter and New Cooperative on Sunday, the agriculture group said there would be a "very very public disruption to the grain, pork and chicken supply chain" if it was not able to recover its systems immediately.

BlackMatter, founded in July 2021, claims to have incorporated the "best features" from Russian ransomware group DarkSide, REvil and LockBit, according to Recorded Future.

On its website, BlackMatter advertises the purchase of access to corporate networks in the U.S., Canada, Australia and the U.K. The group targets companies with revenue of $100 million or more that have 500 to 15,000 hosts on their network.

BlackMatter's website emphasizes that the group does not attack "critical infrastructure," including hospitals, nuclear power plants, water treatment facilities, oil pipelines and refineries, the defense industry, nonprofit companies, and the government sector.

Though New Cooperative states it is considered critical infrastructure as defined by the Department of Homeland Security, BlackMatter argues that it does not "fall under its rules," according to the screenshot.

"Everyone will only incur losses. Everything is tied to the commerce, the critical ones mean the vital needs of a person, and you earn money," the group added before offering to come to an agreement to resolve the situation.

New Cooperative warned BlackMatter that it would have to contact the Cybersecurity and Infrastructure Security Agency (CISA) and other regulators about the attack.


In additional messages exchanged between the parties shared by Recorded Future's Dmitry Smilyanets on Twitter, BlackMatter writes "do not threaten us, otherwise you will stay without a decryption," before threatening to double the price of the ransom payment.

New Cooperative replies that the situation is "pretty much out of our hands," adding that it "can't control what regulators and the U.S. government does."

"The impact of this attack will likely be much worse than the pipeline attack for context," New Cooperative added, referencing the Colonial Pipeline. "We have no way to control that given the disruption that this has already caused."

"No one will give you decrypters for free," BlackMatter replied. "Look for money."

As the frequency of ransomware attacks have surged in 2021, the Biden administration has called on the private sector to help "raise the bar on cybersecurity." Biden also put Russian President Vladimir Putin on notice, giving him a list of 16 critical infrastructure entities that are "off limits" to Russian cyber attacks.

The entities include energy, water, health care, emergency, chemical, nuclear, communications, government, defense, food, commercial facilities, IT, transportation, dams, manufacturing and financial services.

A spokesperson for the FBI said the agency is aware of the attack on New Cooperative, but declined to comment further. A spokesperson for CISA declined to comment.
 

kyrsyan

Has No Life - Lives on TB
Depending on Biden's threats to protect themselves and their clients instead of beefing up their systems security was a stupid, bonehead move.
Whoever is doing this wants to disrupt important industries and will continue to do so until caught.
 

Masterphreak

Senior Member
They weren't the only ones hit. This one below affects the industry I work in. This is causing problems for thousands of radio stations across the country.


Marketron Hit With Cyberattack
By Radio Ink -September 20, 20212

In an e-mail to customers CEO Jim Howard said the cyberattack came from the Russian criminal organization BlackMatter.  All Marketron customers may experience an interruption in service. Howard says the company has not yet discovered how its network was exploited.

Howard says Marketron is communicating with BlackMatter and the FBI. “All available resources are being applied to restoring systems as quickly as possible. This includes working with third-party security experts and bringing in additional resources. While security and rapid disaster recovery have been top priorities, we obviously have not done enough. We know you count on us to keep your business operational, and we are extremely sorry for this impact.”

As of this morning, all Marketron services were offline.

The Pitch platform is online and currently not impacted.

Marketron Traffic, Visual Traffic Cloud, Exchange and Advertiser Portal have all be impacted. RadioTraffic and RepPak services were not impacted; however, out of an abundance of caution they were taken offline.

Impacted products include:
· Marketron Traffic
· Visual Traffic Cloud
· RadioTraffic
· Marketron Exchange products for all traffic clients, including Electronic Orders and Invoices, Network Connect, Proof of Performance and PayNow
· Advertiser Portal
· Traffic Portal
· RepPak
 

Masterphreak

Senior Member
Do some research about these mentioned groups. They are what is referred to as RaaS or ransomware as a service type of groups. Anyone can use their "platforms" to carry out attacks. They just take a cut of the ransom money.
 

knowzone

Veteran Member
This is your corrupt satanic federal government at work here folks!

YEP!

The "jab" isn't producing the results wanted/needed. Time to starve the populace.
First the food suppliers, then as a backup, Bill Gates to Hell and the CCP buying up future producing farm land.

"They", want most everyone dead, then, roll out robotics with advanced programming. (don't really believe in A/I - yet).
Predictive/entertainment programming from the past 40 years of sci-fi gives a clue as to the future.

Most are destined to die. The evil in the "hearts"? of these beings has been a long, long part of our taught history.

kz
 

Ta-wo-di

Veteran Member
BlackMatter's website emphasizes that the group does not attack "critical infrastructure," including hospitals, nuclear power plants, water treatment facilities, oil pipelines and refineries, the defense industry, nonprofit companies, and the government sector.
Well let's give them a halo for being so thoughtful and caring. My employer as a reseller of SIP and VoIP services is dealing with a DDoS ransomware attack on VoIP.ms since last Thursday. We have played hell trying to get alternate services set up for our customer base, one of which is in that critical infrastructure list. Hackers :fgr::fgr::fgr::fgr::fgr::sldr::sldr::sldr:
 

Blacknarwhal

Let's Go Brandon!
Honestly, all this ransomware nonsense really should be teaching people about the importance of offline backups. When all you have to do is pull a terminal out of the network and replace it, ransomware loses all its power.
 

Masterphreak

Senior Member
I can't believe that we don't have people that can't undo this hack in a few minutes.
It's not so much about undoing it as it is finding out how they were exploited. If they don't find out the method used to exploit their network and close the holes... it will just happen again.
 

CGTech

Has No Life - Lives on TB
Honestly, all this ransomware nonsense really should be teaching people about the importance of offline backups. When all you have to do is pull a terminal out of the network and replace it, ransomware loses all its power.

Exactly. We had a ransomware attack on a client (.avos2 extension, never seen that one before!) and they had a backup. Had them back up within 8 hours.
 

Housecarl

On TB every waking moment
Honestly, all this ransomware nonsense really should be teaching people about the importance of offline backups. When all you have to do is pull a terminal out of the network and replace it, ransomware loses all its power.

Office back-ups, internet removed systems and a look at what can be "down technologied". Got typewriter?
 

psychgirl

Has No Life - Lives on TB
These ransomware groups and other internet scammers need to be tracked down and terminated.
Yep. Been saying this for a very long time but as I was told by the Apple Phone fraud department when I got totally hacked?.... there ain’t nothing can be done.

Nothing. That’s why they only follow all fraud claims and pay the damages. That’s all that can be done.
That’s also why the price of things are so d**** high. They just pay and pay all day long to make up for the hackers/scammers.
 
Top