Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

North American Propane Distributor ‘Superior Plus’ Discloses Ransomware Attack

North American propane distributor Superior Plus this week announced that it had to shut down certain computer systems after falling victim to a ransomware attack.

The company says it discovered the breach on Sunday, December 12, and that, as a response, it took steps to mitigate impact on corporate data and operations.

North American propane distributor Superior Plus this week announced that it had to shut down certain computer systems after falling victim to a ransomware attack.

The company says it discovered the breach on Sunday, December 12, and that, as a response, it took steps to mitigate impact on corporate data and operations.

“Superior has temporarily disabled certain computer systems and applications as it investigates this incident and is in the process of bringing these systems back online,” the company says.

Superior, which retained independent security experts to investigate the assault, also notes that it doesn’t have evidence that the attackers have been able to compromise the security of customer or other personal data.

Distributing and selling propane and distillates and related products and services, the company operates at more than 780,000 locations in the United States and Canada.

In an emailed comment, Chris Clements, VP of Solutions Architecture, Cerberus Sentinel, points out that the attack was only detected after the ransomware was deployed, but that it’s unclear for how long the attackers actually had access to Superior Plus’ systems before that.

“Normal attacker dwell time typically extends weeks or months before they trigger ransomware. During this time, the attackers pivot throughout the victim’s network and attempt to escalate their access level to gain complete control of all systems and data. Mass scale data exfiltration has also become the norm in these events that can trigger a secondary extortion demand from the attackers,” Clements says.

He also points out that organizations need to take security very seriously, especially when customer data is involved.

“Getting security right takes talent, budget, and a lot of hard work. It truly takes a cultural approach to security by an organization that starts with understanding the extent of their risk exposure and what it takes to secure their environment,” Clements adds.

Related: HR Management Firm Kronos Needs Weeks to Recover From Ransomware Attack

Related: Cyber Defenders Should Prepare for Holiday Ransomware Attacks

Related: Australian Electricity Provider ‘CS Energy’ Hit by Ransomware

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack