Here once again, the REvil ransomware operators struck a well-known organisation. In this instance, they struck Centroid Inc and downloaded their sensitive and highly confidential documents from the company’s database.
Centroid has been in business for over 20 years and is exclusively focused on Oracle technologies. As an Oracle Platinum Partner, and Specialized Partner for multiple years for North America in both Engineered Systems and Technology, we have the experts that others turn to for best practices in Oracle applications, technology and hardware implementations. Their relentless pursuit of providing the best solutions is a testament to and clear advantage to our success and yours, which is why their first customer is still with them today. Centroid understands how to deploy Oracle in the Cloud and assess, plan, and navigate the right path to the Cloud for your business. They know how to best migrate and manage your workloads on-premise or in the Cloud and can maximize your Oracle investment and provide their client’s business with tightly integrated, comprehensive, and superior services.
The ransomware operators have posted a list of data folders that seem to contain highly sensitive and confidential information of the company. The Cyble Research Team could not verify this data leak, but it seems that the data leak includes Centroid’s financial data backup, software data backup, confidential data of the organisations which may have been in contact with Centroid Inc, and much more.
Below are few snapshots from the large lot being leaked by the REvil ransomware operators-:
Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.
Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web, and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.