The Cloud Consultancy Europe Ltd.
+44 (0) 203 637 6667 [email protected]

The BlackCat ransomware group, aka ALPHV, has claimed responsibility for the recent cyber attack on Swissport that caused flight delays and service disruptions.

The €3 billion revenue firm, Swissport, has a presence across 310 airports in 50 countries and provides cargo handling, maintenance, cleaning, and lounge hospitality services.

BlackCat has now been seen by BleepingComputer (the author of this article) to leak a minuscule set of terabytes of data supposedly obtained from the recent ransomware attack.

BlackCat starts leaking data

As reported by BleepingComputer,  the cargo and hospitality services giant had earlier disclosed a ransomware attack on its systems.

On Tuesday, the BlackCat (ALPHV) ransomware group posted a small set of sample files that the group claims to have obtained from Swissport.

The threat actor also announced they are willing to sell the entire 1.6 TB “data dump” to a prospective buyer:

BlackCat (ALPHV) ransomware op claims to have 1.6TB of Swissport’s data (Darktracer)

The data leak page seen by BleepingComputer contains images of passports, internal business memos, and what appear to be details of job candidates, such as their:

  • Full Name
  • Passport Number
  • Nationality
  • Religion (Muslim or Non-Muslim indicator)
  • Email
  • Phone number
  • Job role, interview scors and other recruitment information

BleepingComputer has reached out to Swissport to better understand what this data represents, notably the flag indicator recording the religion of job candidates.

With its 66,000 employees worldwide, Swissport handles 282 million passengers and 4.8 million tons of cargo every year, making it a vital link in the global aviation travel industry chain.

As such, while the cyberattack on Swissport was “largely contained” with systems fully cleaned and restored, questions remain as to what happens to sensitive data that threat actors may have gotten their hands on.

BlackCat emerged after BlackMatter’s shut down

Dubbed the “most sophisticated” ransomware group of 2021, BlackCat ransomware group emerged after BlackMatter’s shut down by law enforcement.

This month, BlackCat members confirmed they are indeed linked to the BlackMatter/DarkSide operation.

While the ransomware gang calls themselves ALPHV, security researcher MalwareHunterTeam previously named the ransomware BlackCat after the group used the image of a black cat on every victim’s Tor payment page. Since then, the ransomware operation has been known as BlackCat when discussed in the media or by security researchers.

BleepingComputer is aware of multiple victims targeted by this ransomware gang since November 2021 from numerous countries, including the USA, Australia and India.

Ransom demands typically range between $400,000 to $3 million payable in Bitcoin or Monero. Victims paying in bitcoin incur an additional 15% fee on top of the demanded ransom.

As an additional extortion method, the BlackCat threat actors threaten to DDoS (Denual-Of-Service attack) victims until they pay a ransom.

Overall, this is a highly sophisticated ransomware operation with the threat actors clearly considering all aspects of attacks.