Breaking

Croatia’s largest petrol company becomes victim to ransomware

INA Group (belongs to MOL group) is a Croatia’s biggest oil company and consists of many petrol stations for its operations. On Feb14th, at 10:00 pm local time the company became victim to a ransomware attack and has infected its systems. However, the company has confirmed its petrol delivery to customers and payments aren’t affected. 

Invoice management, handling loyalty cards, mobile vouchers management, electronic vignettes, and natural gas bill payments are facing hindrance. INA disclosed the attack and did regret for the inconvenience it has caused to its customers. INA also mentioned in their website that they are taking steps to resolve the situation and keep the customers informed about their progress. 

The CLOP Ransomware behind INA take down

As per Sophos Malware Analyst, with Twitter handle @AltShiftPrtScn has mentioned that there is a new ransomware strain that is going live, working with command-and-control server, and is involved with CLOP operations. Adding to his point, security researchers have detected CLOP ransomware variants in VirusTotal, a malware scanning application.

Please note that the CLOP ransomware has upgraded itself, and is now targeting companies instead of individuals, and it is also lately called ‘Big-Game Ransomware’, as it encrypts corporate data and demands for exorbitant ransom.

How to defend against CLOP ransomware attack?

Organizations need to ensure they have updated their operating systems, applications, firmware and BIOS to the latest security patches. Building a robust firewall configurations, cybersecurity awareness to the employees, data backup protocols, and data security configurations can reduce the probability of being hit by CLOP ransomware. 

However, these measures don’t mean you are a hundred percent secured. Being proactive is a key to reducing the chances of being attacked. However, please ensure you do have reactive measures like log management, SIEM, threat detection and more to identify the attack immediately.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

View Comments

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago