Trending

HomeBlog
Spanish state-owned railway infrastructure management body got allegedly struck by REVIL

Spanish state-owned railway infrastructure management body got allegedly struck by REVIL

With the on-going data breaches, the wave of compromised data is on the rise. The main motive of cybercriminals or ransomware operators behind these breaches is to acquire a large sum of money from their victims. Keeping a track of these data breaches, recently our research team came across a leak of Administrador de Infraestructuras Ferroviarias (ADIF).

Founded on 1 January 2005, ADIF is a Spanish state-owned railway infrastructure manager under the responsibility of the Ministry of Development, charged with the management of most of Spain’s railway infrastructure, that is the track, signalling and stations. With over 13,000 employees the company has been earning a revenue of around $8 Billion.

As per now, the ransomware operators have posted a sample of sensitive data files of the company being downloaded by them. As per the Cyble Research Team, this small data leak from the large lot seems to be a warning for the company to accept the terms of the ransomware operators. Unfortunately, if ADIF fails to contact REvil and refuses to accept their terms, then REvil seems to attack the company the third time and publish their confidential data on the public domain. Along with it, REvil allegedly claims to have access to 800 gigabytes of the company’s data.

As per Cyble Research Team, the operators may have downloaded, what seems to be the company’s confidential data such as ADIF’s high-speed hiring committee contracts, property records, field works reports, project action plans, documents about customers, and much more.

Below are the snapshots of the sample data leak documents been posted by REvil ransomware operators.

Tips on how to prevent ransomware attacks –

report-ad-banner

It is recommended to follow the above-mentioned prevention methods and never pay the ransom.

About Cyble

Cyble is an Atlanta, US-based, global premium cyber-security firm with tools and capabilities to provide near real-time cyber threat intelligence

Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.

This monitoring and notification platform gives the average consumer insights into their personal cybersecurity issues, allowing them to take action then as needed. It has recently earned accolades from Forbes as being the top 20 cyber-security companies to watch in 2020. 

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading