{
	"id": "7784e53a-8650-4fcb-bd2f-bd9f6a987e8f",
	"created_at": "2026-04-06T00:12:53.783396Z",
	"updated_at": "2026-04-10T03:30:14.716714Z",
	"deleted_at": null,
	"sha1_hash": "2714e46da2c8b3b58b751490b955e84f896bb61d",
	"title": "Ransomware Operators Demand $14 Million From Power Company",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 69823,
	"plain_text": "Ransomware Operators Demand $14 Million From Power\r\nCompany\r\nBy Ionut Arghire\r\nPublished: 2020-07-02 · Archived: 2026-04-05 13:51:54 UTC\r\nThe threat actor behind the Sodinokibi (REvil) ransomware is demanding a $14 million ransom from\r\nBrazilian-based electrical energy company Light S.A.\r\nThe company has confirmed that it was hit with a cyberattack without providing specific information on the type\r\nof compromise, but AppGate’s security researchers, who have obtained a sample of the malware believed to have\r\nbeen used in the attack, are confident that the incident involves the Sodinokibi ransomware.\r\n“Although we can’t confirm that this was the exact same file used in the attack, the evidence points to being\r\nconnected to the Light SA breach, such as the ransom price, for example,” AppGate notes.\r\nAccording to the researchers, someone from within the company submitted the same sample to a public sandbox,\r\nlikely in an attempt to “understand how it works.”\r\nAnalysis of the configuration of the malware revealed information on the threat actor, the campaign ID, as well as\r\nthe URL that the victim is asked to access for instructions.\r\nOn that page, which is hosted on the deep web, the victim is informed that they need to pay a ransom of\r\n106,870.19 XMR (Monero) by June 19. The deadline, however, has passed, and the amount doubled, to 215882.8\r\nXMR, which amounts to $14 million.\r\nAdvertisement. Scroll to continue reading.\r\nThe same web page reveals information about the attackers, clearly mentioning the name Sodinokibi, and attempts\r\nto persuade the victim to pay the ransom by promising full decryption of the affected data.\r\nhttps://www.securityweek.com/ransomware-operators-demand-14-million-power-company\r\nPage 1 of 2\n\n“The whole attack looks very professional, the web page even includes a chat support, where the victim can speak\r\ndirectly with the attacker,” the researchers note.\r\nAvailable under the RaaS (Ransomware-as-a-Service) model, Sodinokibi is operated by a threat actor likely\r\naffiliated to “Pinchy Spider,” the group behind the GandCrab ransomware.\r\nWhile investigating the malware itself, AppGate discovered that it includes functionality to escalate privileges by\r\nleveraging 32-bit and 64-bit exploits for the CVE-2018-8453 vulnerability in the Win32k component of Windows.\r\n“Unfortunately, there is no global decryptor for the family, which means that the attacker’s private key is required\r\nto decrypt the files,” AppGate also notes.\r\nRelated: Sodinokibi Ransomware Operators Target POS Software\r\nRelated: Hackers Leak Data Stolen From UK Electricity Market Administrator Elexon\r\nRelated: Hackers Threaten to Leak Files Stolen From Australian Beverage Firm Lion\r\nSource: https://www.securityweek.com/ransomware-operators-demand-14-million-power-company\r\nhttps://www.securityweek.com/ransomware-operators-demand-14-million-power-company\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.securityweek.com/ransomware-operators-demand-14-million-power-company"
	],
	"report_names": [
		"ransomware-operators-demand-14-million-power-company"
	],
	"threat_actors": [
		{
			"id": "8610b0d9-a6af-4010-818f-28671efc5d5e",
			"created_at": "2023-01-06T13:46:38.897477Z",
			"updated_at": "2026-04-10T02:00:03.138459Z",
			"deleted_at": null,
			"main_name": "PINCHY SPIDER",
			"aliases": [],
			"source_name": "MISPGALAXY:PINCHY SPIDER",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "c84bbd2e-003d-4c43-8a46-d777455db2c7",
			"created_at": "2022-10-25T15:50:23.701006Z",
			"updated_at": "2026-04-10T02:00:05.378962Z",
			"deleted_at": null,
			"main_name": "GOLD SOUTHFIELD",
			"aliases": [
				"GOLD SOUTHFIELD",
				"Pinchy Spider"
			],
			"source_name": "MITRE:GOLD SOUTHFIELD",
			"tools": [
				"ConnectWise",
				"REvil"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "9df68733-9bcd-43b1-88f1-24b110fa3d56",
			"created_at": "2022-10-25T16:07:24.051993Z",
			"updated_at": "2026-04-10T02:00:04.851037Z",
			"deleted_at": null,
			"main_name": "Pinchy Spider",
			"aliases": [
				"G0115",
				"Gold Garden",
				"Gold Southfield",
				"Pinchy Spider"
			],
			"source_name": "ETDA:Pinchy Spider",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"GandCrab",
				"GrandCrab",
				"REvil",
				"Sodin",
				"Sodinokibi",
				"VIDAR",
				"Vidar Stealer",
				"certutil",
				"certutil.exe",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434373,
	"ts_updated_at": 1775791814,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2714e46da2c8b3b58b751490b955e84f896bb61d.pdf",
		"text": "https://archive.orkl.eu/2714e46da2c8b3b58b751490b955e84f896bb61d.txt",
		"img": "https://archive.orkl.eu/2714e46da2c8b3b58b751490b955e84f896bb61d.jpg"
	}
}