JBS pays $11 million ransom following cyber attack
The White House says a Russian state-backed hacking group was behind the ransomware attack
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
JBS Foods has paid an $11 million (£7.8 million) ransom to hackers who had compromised its IT systems late last month, the firm confirmed on Wednesday.
The company, which is the largest processor of meat in the world and produces close to a quarter of the US' beef, fell victim to a ransomware attack orchestrated by unknown actors on 30 May. The firm was forced to suspend all affected systems and, in some areas, shut down production for 24 hours.
On 3 June, JBS announced that the attack had been resolved and that all of its systems were operational again, adding that there was no evidence to suspect that "any customer, supplier or employee data [had] been compromised or misused as a result of the situation".
Despite the attack coming to an end, the company has now confirmed that it had made a ransom payment to the attackers, totalling $11 million (£7.8 million) in Bitcoin.
JBS US CEO Andre Nogueira described the decision as a "difficult" one to make.
"However, we felt this decision had to be made to prevent any potential risk for our customers," he added.
JBS also confirmed in a statement that "at the time of payment, the vast majority of the company's facilities were operational".
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The decision had been reached in consultation with JBS' internal IT professionals as well as third-party cyber security experts in order to "mitigate any unforeseen issues related to the attack and ensure no data was exfiltrated."
However, it also reiterated that "preliminary investigation results confirm that no company, customer or employee data was compromised" in the attack.
RELATED RESOURCE
Defend your organisation from evolving ransomware attacks
Learn what it takes to reduce risk and strengthen operational resiliency
Last week, the White House attributed blame for the attack to a Russian state-backed hacking group, described by the FBI as "one of the most specialised and sophisticated cybercriminal groups in the world".
This prompted President Joe Biden to issue a warning to Russia on Thursday:
"The United States will respond in a robust and meaningful way if the Russian government engages in harmful activities," he said as he arrived in the UK for the G7 summit, as part of his first overseas trip as president.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
How the rise of the AI ‘agent boss’ is reshaping accountability in ITIn-depth As IT companies deploy more autonomous AI tools and agents, the task of managing them is becoming more concentrated and throwing role responsibilities into doubt
-
Hackers are pouncing on enterprise weak spots as AI expands attack surfacesNews Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
