Pietro Melillo : 1 July 2024 16:27
Recently, TÜV Rheinland AG, one of the leading global certification and inspection companies, has appeared on the data leak site of the ransomware group RansomEXX.
At present, there are no official confirmations from the organization regarding the veracity of the breach, as TÜV Rheinland AG has not yet released any press statements on its website about the incident. Therefore, this article should be considered as an “intelligence source.”
RansomEXX is a well-known group of cybercriminals specializing in ransomware attacks, targeting large organizations and companies across various sectors. The group is known for its modus operandi of encrypting victims’ data and subsequently demanding a ransom for restoring access. In case of non-payment, RansomEXX threatens to publish the stolen sensitive data online, a method known as “double extortion.”
Iscriviti GRATIS alla RHC Conference 2025 (Venerdì 9 maggio 2025)
Il giorno Venerdì 9 maggio 2025 presso il teatro Italia di Roma (a due passi dalla stazione termini e dalla metro B di Piazza Bologna), si terrà
la RHC Conference 2025. Si tratta dell’appuntamento annuale gratuito, creato dalla community di RHC, per far accrescere l’interesse verso le tecnologie digitali, l’innovazione digitale e la consapevolezza del rischio informatico.
La giornata inizierà alle 9:30 (con accoglienza dalle 9:00) e sarà interamente dedicata alla RHC Conference, un evento di spicco nel campo della sicurezza informatica. Il programma prevede un panel con ospiti istituzionali che si terrà all’inizio della conferenza. Successivamente, numerosi interventi di esperti nazionali nel campo della sicurezza informatica si susseguiranno sul palco fino alle ore 19:00 circa, quando termineranno le sessioni. Prima del termine della conferenza, ci sarà la premiazione dei vincitori della Capture The Flag prevista per le ore 18:00.
Potete iscrivervi gratuitamente all'evento utilizzando questo link.
Per ulteriori informazioni, scrivi a [email protected] oppure su Whatsapp al 379 163 8765
Supporta RHC attraverso:
Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo.
According to available sources, TÜV Rheinland AG has recently appeared on RansomEXX’s data leak site, suggesting that the group may have gained unauthorized access to corporate data. However, there are no specific details about what types of data may have been compromised or the extent of the attack.
TÜV Rheinland AG, headquartered in Germany, operates in over 60 countries with more than 20,000 employees, providing certification, inspection, and testing services. The potential data breach could have significant repercussions not only for the company but also for its global clients and partners.
To date, TÜV Rheinland AG has not issued any official statement confirming or denying the attack. The absence of a public statement makes it difficult to assess the actual scope and severity of the situation. Organizations often need time to fully understand the extent of a cyberattack and determine the best response strategy, which may explain the lack of immediate information.
If the attack is confirmed, TÜV Rheinland AG could face several issues, including:
The possible data breach of TÜV Rheinland AG by RansomEXX underscores the importance of cybersecurity in modern organizations. Pending an official statement from the company, it is crucial to remain vigilant and adopt preventive measures to protect sensitive data. This case further confirms that the threat of ransomware is a tangible reality requiring prompt and effective responses from companies worldwide.
As is our practice, we always leave room for a statement from the company should they wish to provide updates on the matter. We would be pleased to publish such information in a dedicated article highlighting the issue.
RHC Dark Lab will monitor the situation’s evolution to publish further news on the blog, should there be any substantial updates. If there are people informed about the facts who wish to provide information anonymously, they can use the whistleblower’s encrypted email.