Perfection Fresh, a leading Australian fresh produce company, has confirmed that it was the target of a ransomware attack carried out by the Sarcoma ransomware group. The attack, which surfaced recently, has put the company’s sensitive data at risk, with Sarcoma claiming to have stolen approximately 690 gigabytes of information. Among the leaked files are passport scans of employees and confidential agreements with clients and suppliers, highlighting the serious nature of the breach.
The Sarcoma group has made its presence known on the dark web by listing Perfection Fresh alongside other Australian victims, showcasing the extent of their cybercriminal activities. Although the group has not publicly disclosed a ransom demand, the publication of sensitive documents serves as evidence of their successful infiltration. In light of the attack, a spokesperson for Perfection Fresh stated that the company is actively working to mitigate the impact of the breach and has informed relevant stakeholders about the situation.
In response to the incident, Perfection Fresh has obtained an injunction to prevent any unauthorized access or dissemination of the leaked data. The company is urging stakeholders to remain vigilant against potential phishing scams or other malicious communications that may arise as a result of the attack. They have also set up a dedicated email address for reporting suspicious activities, emphasizing their commitment to ensuring the safety and security of their employees and clients.
Perfection Fresh is collaborating with the Australian Cyber Security Centre and the Office of the Australian Information Commissioner to address the breach and assess the situation thoroughly. The company, which operates across multiple states and employs over 1,000 people, expressed gratitude for the ongoing support from stakeholders during this challenging time. As the investigation unfolds, the focus remains on reinforcing security measures to prevent future incidents and safeguarding sensitive information from cyber threats.