Canadian retailer Home Hardware hit by ransomware

A company spokesperson says some corporate data, not customer data, is affected

One of the country’s biggest privately-held dealer-owned hardware retailers has acknowledged it was hit by ransomware, with the threat group promising to start releasing copied data today, April 2.

Home Hardware Stores Ltd., with over 1,050 stores under the Home Hardware, Home Building Centre and Home Furniture banners, acknowledged to ITWorldCanada.com an attack hit it in February.

“An unauthorized third-party was able to access parts of our corporate data,” Jessica Kuepfer, the company’s director of communications, said in an e-mail Friday.

“We immediately engaged our cybersecurity firm and quickly implemented countermeasures to isolate and contain the attack. We have maintained full business continuity.”

Each of the stores is independently owned and operated. Based on our investigation, it appears that attack has not impacted dealer retail systems or any consumer transaction or payment data.”

At press time Kuepfer didn’t reply to a query about how much money DarkSide has demanded and whether the company has talked to the attackers.

The attack against the Ont.-based Home Hardware comes after the DarkSide ransomware group began posting what it said was corporate data copied from the company and promising to publicly release data if it isn’t paid for decryption keys.

A screenshot of the notice on the group’s website says:

“We have downloaded a lot of your private data. You can see examples below. If you need proofs we are ready to provide you with it. The data is preloaded and will automatically be published in our blog if you do not contact us. After publication your data can be downloaded by anyone. It is stored on our tor for CDN and will be available for at least six months.”

Screenshots of some of the documents seen by ITWorldCanada.com include what appears to be a December 2020 financial report and a November 2020 letter marked “Strictly Private and Confidential” dealing with an acquisition that was announced three months later.

The DarkSide website also includes countdown clocks for the automatic release of what are said to be copied documents for today, Saturday and Sunday.

Companies dealing with data exfiltration situations have no good options, commented Brett Callow, a British Columbia-based threat researcher for Emsisoft.

“They’ve been breached, and their data is in the hands of cybercriminals. If they refuse to pay the criminals, their data will be released online. If they do pay, they’ll simply get a pinky-promise from a bad faith actor that the stolen data will be deleted – and, of course, there is ample evidence that that does not happen. Why would a criminal enterprise delete data that it may be able to use or further monetize?

“Unfortunately, data exfiltration is proving to be a strategy that works, with many organizations that were able to recover their systems using backups having still paid demands to stop their data being released. Since ransomware groups began exfiltrating data at the end of 2019, about 1,500 organizations have had their data stolen and posted online, while many others paid to prevent it being published.”

According to a recent analysis by security vendor Varonis, DarkSide is a ransomware-as-a-service group that began operating last August. Like other RaaS services it offers, anyone who helps spread their malware gets 10 to 25 per cent of the payout.

Since starting they have become known for their “professional operations and large ransoms,” the report said.

“They provide web chat support to victims, build intricate data leak storage systems with redundancy, and perform financial analysis of victims prior to attacking,” it read. “Our reverse engineering revealed that Darkside’s malware will check device language settings to ensure they don’t attack Russia-based organizations. They have also answered questions on Q&A forums in Russian and are actively recruiting Russian-speaking partners.”

DarkSide often uses compromised third-party contractor accounts to access Virtual Desktop Infrastructure (VDI) that had been put in place to facilitate remote access during the pandemic, says Varonis. It has also exploited servers, and then quickly deploys an additional remote access backdoor that would preserve access should the vulnerable server be patched.

“While neither of these vectors is novel, they should serve as a warning that sophisticated threat actors are easily bypassing perimeter defences,” according to the report. “They illustrate the need for multi-factor authentication on all internet-facing accounts and rapid patching of internet-facing systems.”

In January, Bitdefender released a decryptor for the version of the DarkSide encryption algorithm used at that time.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now