U.S. markets open in 2 hours 49 minutes
  • S&P Futures

    4,252.50
    +21.00 (+0.50%)
     
  • Dow Futures

    33,950.00
    +191.00 (+0.57%)
     
  • Nasdaq Futures

    14,346.75
    +83.75 (+0.59%)
     
  • Russell 2000 Futures

    2,315.50
    +15.20 (+0.66%)
     
  • Crude Oil

    73.04
    -0.04 (-0.05%)
     
  • Gold

    1,783.40
    0.00 (0.00%)
     
  • Silver

    26.09
    -0.02 (-0.06%)
     
  • EUR/USD

    1.1949
    +0.0016 (+0.13%)
     
  • 10-Yr Bond

    1.4870
    0.0000 (0.00%)
     
  • Vix

    15.57
    -1.09 (-6.54%)
     
  • GBP/USD

    1.3976
    +0.0012 (+0.09%)
     
  • USD/JPY

    110.8200
    -0.1420 (-0.13%)
     
  • BTC-USD

    33,237.63
    -912.75 (-2.67%)
     
  • CMC Crypto 200

    802.85
    -7.34 (-0.91%)
     
  • FTSE 100

    7,097.47
    +23.41 (+0.33%)
     
  • Nikkei 225

    28,875.23
    +0.34 (+0.00%)
     

JBS Hackers Took Data From Australia and Brazil, Researcher Says

  • Oops!
    Something went wrong.
    Please try again later.
·3 min read
  • Oops!
    Something went wrong.
    Please try again later.

(Bloomberg) -- The hackers who used ransomware to shut down JBS SA, the world’s largest meat producer, explored the potential attack in February and stole data for several months from the food giant’s locations in Australia and Brazil, according to security researcher SecurityScorecard Inc.

The “reconnaissance” phase of the cyberattack, in which hackers learn about a target and where they might exploit it, began in February, according to a report from SecurityScorecard shared with Bloomberg. The research is based on multiple public and private sources of intelligence, observations on the dark web and investigative tools such as NetFlow -- which tracks digital traffic flows -- according to Ryan Sherstobitoff, vice president of cyberthreat research and intelligence at SecurityScorecard. The company plans to release the report Tuesday.

A spokesperson for JBS USA disputed the findings, saying it was inconsistent with a preliminary investigation conducted by third-party experts.

“We have discovered no evidence that any company data was exfiltrated, and no evidence that Brazil was impacted in any way,” said Nikki Richardson, the spokesperson. “The investigation is ongoing, and it would be irresponsible for us to comment on speculative reports or unfounded rumors.”

“The fact is that the company’s cybersecurity protocols allowed for a quick resolution to this targeted criminal attack, resulting in the loss of less than one days’ worth of production,” she said.

The ransomware attack late last month forced JBS to stop production at its beef plants in the U.S. -- accounting for almost 25% of American supplies -- and slow pork and poultry operations. The FBI has attributed the incident to REvil, a hacking group that researchers say has links to Russia.

It is unknown how or where the hackers broke into the San Paolo-based food company, but in March, they began taking data from JBS’s Australia location, according to the researchers. SecurityScorecard found credentials belonging to employees of the company’s Australia branch on the dark web right before the exfiltration began, Sherstobitoff said in an interview.

SecurityScorecard also found evidence suggesting that hackers took data in April and May from a JBS location in Brazil. The company was then hit at the end of May with ransomware, which encrypts data until the victim pays to unlock their systems.

“As with all ransomware operations, the attackers are likely interested in exfiltrating data and potentially leaking it on the dark web if victims do not pay,” according to the report. “Typically, the threat actor exfiltrates data before encrypting files, then uses the data to extort the victim for financial gain.”

SecurityScorecard’s research, however, lines up with private-sector investigations of the attack, said a person familiar with those probes. The attackers began taking large amounts of data from the company’s network in Australia in March and continued until the hack was discovered late last month, the person said. Citing analysis of the hackers’ internet traffic patterns around the stolen data, the person said the attackers appear to have spent an unusually long time stealing information before detonating the ransomware.

More stories like this are available on bloomberg.com

Subscribe now to stay ahead with the most trusted business news source.

©2021 Bloomberg L.P.