Skip to main content

Command Palette

Search for a command to run...

HOT: A Technology Corporation in Vietnam Hit by Ransomware Attack

Updated
4 min read
HOT: A Technology Corporation  in Vietnam Hit by Ransomware Attack

According to the latest cybersecurity news gathered by FPT Threat Intelligence, CMC Corporation — a technology corporation in Vietnam — has fallen victim to a ransomware attack carried out by the crypto24 group. This data breach, discovered on 2025-04-12 08:52:39, raises alarms about the increasing danger of targeted cyberattacks (APT) aimed at critical organizations in Vietnam.

Summary of the ransomware incident report (according to HookPhish)

Figure 1. Ransomware incident report summary (via HookPhish)

Information about the Crypto24 Group

Currently, there is very little information and technical analysis about this malware and APT group. Below are some notable details gathered by FPT Threat Intelligence:

Type of Malware

Crypto24 is a type of ransomware, specializing in encrypting victims' data and demanding a ransom for recovery. After infection, Crypto24 encrypts all files and appends the “.crypto24” extension to the file names.

Files encrypted by Crypto24 ransomware (.crypto24 extension)

Figure 2. Files encrypted by Crypto24 ransomware

Simultaneously, the malware creates a ransom note file named Decryption.txt:

  • Users are informed that their data has been encrypted and stolen.

  • To retrieve the data, victims must purchase a “decryption key” from the attacking group.

  • The attackers warn that:

    • Renaming or modifying locked files may render them unrecoverable.

    • If the ransom is not paid, the data will be publicly leaked on leak sites like .onion controlled by the group.

IOCs

According to data collected from sources monitoring leak sites on the Dark Web, the crypto24 ransomware group has operated a .onion site titled Public Data Storage. This site was last accessed at 02:31 AM on 15/04/2025 and is currently inactive. It may have been used to store or publish stolen data from victims as part of a ransom pressure strategy.

Information about IOCs of Crypto24 ransomware

Figure 3. Information about Crypto24 ransomware IOCs

Victims of the Crypto24 Group

The first victims of the Crypto24 ransomware group were discovered on 08/04/2025, and the attacks indicate that the group is intensifying its malicious campaign globally, targeting organizations in various sectors: technology, finance, legal services, and enterprise data. Below is a list of 07 organizations confirmed as victims of this group (updated as of 15/04/2025):

  1. CMC Corporation (Vietnam)

    • Date Discovered: 12/04/2025

    • Impact Level: 2 TB of data stolen from MariaDB, MongoDB, RARS-DB,... at the data center

  2. ModulusGroup, Ludi-SFM (Indonesia)

    • Casino customer data, ERP databases, system project source code.
  3. Taxplan (Canada)

    • Documents and databases related to tax and tax management software.
  4. Mochtar Karuwin Komar (Indonesia) – Law Office

    • Legal records, financial information, contracts, client consultation data.
  5. Technoforte Software Pvt Ltd (India)

    • Main project source code for Palms (including mobile version).
  6. International Business Service (India)

    • ID card images, personnel data, payment records of about 3,000 employees.
  7. Iris Neofinanciera (Colombia)

    • Entire Google Drive files, chat data, 5-year personnel documents, SQL databases, and customer personal information.

Countries with victims of this malware (according to Ransomware.live)

Figure 4. Countries with victims of this malware (according to Ransomware.live)

Recommendations

FPT Threat Intelligence recommends organizations and individuals take several measures to prevent this particularly dangerous attack campaign:

  • Network Monitoring and Intrusion Detection: Deploy network monitoring systems (NIDS/NDR) to detect anomalies, unusual encrypted traffic, and suspicious behaviors related to ransomware.

  • Secure Data Backup: Ensure offline backups are available to recover data in case of encryption.

  • System Updates: Always update the latest security patches to protect systems from exploitable vulnerabilities.

  • Access Management: Limit user access rights, apply network segmentation to prevent lateral movement by attackers.

  • Account Security: Use strong, unique passwords and enable multi-factor authentication (MFA) to protect login information.

  • Data Encryption: Implement encryption for sensitive data to protect against theft or leakage.

  • Reduce Attack Surface: Disable unnecessary functions to reduce the risk of exploitation.

  • Enhance Security Awareness: Train employees on security risks and attack methods commonly used by cybercriminals.

  • Monitor Dark Web and Leak Sites: Use threat intelligence services to detect early information leaks about the organization on .onion sites or hacker forums.

  • Regularly Check System Logs: Analyze access logs, authentication logs, and unusual behaviors on servers to detect early privilege escalation or lateral movement in the network.

  • Conduct Regular Penetration Testing: Perform regular penetration testing (Pentest) to identify and fix vulnerabilities that ransomware could exploit.

  • Incident Response Plan (IR Plan): Develop and rehearse scenarios for responding to ransomware attacks, ensuring relevant teams know how to isolate, recover, and report incidents promptly.

References

Newsletters-eng

Part 1 of 50

More from this blog

F

FPT IS Security

721 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.