• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking data security Latest Cybersecurity News

Croatia’s largest petrol company becomes victim to ransomware

John Greenwood Posted On February 24, 2020
1



Croatia ransomware attack

INA Group (belongs to MOL group) is a Croatia’s biggest oil company and consists of many petrol stations for its operations. On Feb14th, at 10:00 pm local time the company became victim to a ransomware attack and has infected its systems. However, the company has confirmed its petrol delivery to customers and payments aren’t affected. 

Invoice management, handling loyalty cards, mobile vouchers management, electronic vignettes, and natural gas bill payments are facing hindrance. INA disclosed the attack and did regret for the inconvenience it has caused to its customers. INA also mentioned in their website that they are taking steps to resolve the situation and keep the customers informed about their progress. 

The CLOP Ransomware behind INA take down

As per Sophos Malware Analyst, with Twitter handle @AltShiftPrtScn has mentioned that there is a new ransomware strain that is going live, working with command-and-control server, and is involved with CLOP operations. Adding to his point, security researchers have detected CLOP ransomware variants in VirusTotal, a malware scanning application.

#Cobalt C2 used in #CLOP ransomware attack: https://t.co/OJluaAPeLV

— PeterM (@AltShiftPrtScn) February 14, 2020

Please note that the CLOP ransomware has upgraded itself, and is now targeting companies instead of individuals, and it is also lately called ‘Big-Game Ransomware’, as it encrypts corporate data and demands for exorbitant ransom.

How to defend against CLOP ransomware attack?

Organizations need to ensure they have updated their operating systems, applications, firmware and BIOS to the latest security patches. Building a robust firewall configurations, cybersecurity awareness to the employees, data backup protocols, and data security configurations can reduce the probability of being hit by CLOP ransomware. 

However, these measures don’t mean you are a hundred percent secured. Being proactive is a key to reducing the chances of being attacked. However, please ensure you do have reactive measures like log management, SIEM, threat detection and more to identify the attack immediately.

Share the article with your friends


Croatia CLOP ransomware attackCroatia INA ransomware attackCroatia oil company ransomware attackCroatia petrol company ransomware attackINA ransomware attackRansomware attack


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Toronto Zoo Faces Cyberattack – Investigation Ensues
January 9, 2024
Ohio Lottery Hit by DragonForce Ransomware Attack
December 28, 2023
LockBit Ransomware Group Exposes Boeing: 43GB of Stolen Data Released
November 12, 2023
1 Comment

AffiliateLabz
February 25, 2020 at 12:50 am
Reply

Great content! Super high-quality! Keep it up! 🙂


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search