The Qilin ransomware group has recently struck Thonburi Energy Storage Systems, a notable battery manufacturer situated in Thailand. The group alleged that the company deliberately refrained from engaging with them, prompting the hackers to initiate the release of a series of documents.
Qilin stated that due to the lack of communication, they were compelled to start publishing these documents on a large scale. The cyber attack on Thonburi Energy Storage Systems caught the attention of the Threat Intelligence Service Falcon Feeds, who shared a screenshot from the ransomware group’s dark web portal to highlight the incident. Qilin ransomware’s declaration, referring to the exfiltrated documents from the TESM attack, emphasized the company’s decision to remain unresponsive to their team’s attempts at contact.
The threat posed by this breach underscores the ongoing challenges posed by ransomware attacks, particularly when targeting critical industries like energy storage and manufacturing.
Furthermore, the hackers from Qilin shared five document samples obtained from the TESM cyber attack, indicating their readiness to disclose sensitive information. This recent incident is part of a broader pattern of cyber attacks on major corporations, with the Qilin ransomware group highlighting their malicious intentions through this targeted operation.
On the 7th of August, the Qilin ransomware group took to their online platform to detail the cyber attack on Thonburi Energy Storage Systems. The group even provided a link to the compromised website, MERCEDES-BENZ.CO.TH, which was accessible at the time of the report.
It’s noteworthy that the target company collaborates with local partners like Thonburi Automotive Assembly Plant (TAAP) and Thonburi Energy Storage Systems (TESM), demonstrating the interconnectedness of various industries.