Ransomware Attack at UK Snack Provider

By Gregory Hale
A British snack food provider, Kenyon Produce (KP) Snacks, suffered an attack by the Conti ransomware group, which had an effect on distribution to supermarkets, and could now be in negotiations for the decryption key.
The German-owned company said it became aware of the attack on January 28, and it immediately took steps to contain the attack. A letter from KP Snacks sent to store owners February 2 said it its systems had been โcompromised by ransomwareโ and it โcannot safely process orders or dispatch goods.โ
โA post was identified on Contiโs data leak site (DLS) on 1 February 2022 confirming the groupโs involvement in the attack against KP Snacks,โ said Silas Cutler, principal reverse engineer at Stairwell. โThis post has since been removed, potentially indicating negotiations are underway for decryption of ransomed systems. When the post was made, Conti had set a timer stating data would be published in 5 days (6 February).
RELATED STORIES
- Cyber Attack Shuts Down German Oil Firm
- Pharma Service Provider Hit in Cyber Attack
- Chemical Maker Hit in Cyber Attack
- Photography Giant Hit in Ransomware Attack
โGroups like Conti are known to use a two-pronged approach when conducting attacks. The first being the ransoming of an organization’s data, followed by the private sale or public disclosure of sensitive internal data. By their nature, ransomware attacks cause severe disruptions to an organization’s infrastructure and recovery can require weeks for even a well-established IT team to fully recover โ even after paying ransom demands and receiving tools to decrypt systems.
KP Snacks includes brands such as PopChips, Skips, Hula Hoops, Penn State pretzels, McCoy’s, and Wheat Crunchies. The company has over 2,000 employees and has annual revenues at $600 million.
Deliveries Delayed
Because of the attack, deliveries from the company to superstores are being delayed or canceled altogether. According to discussions between KP Snacks and its partner supermarkets, the supply shortage issues may last until the end of March.
The company’s internal network had been breached with threat actors gaining access to and encrypting sensitive files, including employee records and financial documents, according to a report in BleepingComputer.
โConti is well known for their broad targeting of companies with revenues over $100 million,โ Cutler said. โAccess to these companies are often sold to Ransomware-as-a-Service (RaaS) providers (like Conti), who handle victim negotiation and in turn share a percentage of the profits with all parties involved. A key challenge with tracking and eventually attributing ransomware attacks is access brokers will often work with multiple RaaS groups in order to maximize their own profits.
โAs attacks from ransomware groups become ever more frequent, having regular backups and practiced disaster recovery procedures are critical for organizations to respond effectively against these types of threats,โ Cutler said.
On the private leak page, Conti shared samples of credit card statements, birth certificates, spreadsheets with employee addresses and phone numbers, confidential agreements, and other sensitive documents.
KP Snacksโ internal IT teams are working with third party security experts to assess the situation.
Lying in Wait
โThe KP Snacks ransomware attack is yet another reminder of the need for strong security protocols as organizationsโ IT and OT networks continue to converge,โ said Marty Edwards, vice president of OT Security at Tenable. โMost ransomware attacks exploit a lack of cyber hygiene, and threat actors are waiting to take advantage. Organizations must protect themselves by doing the basics well โ beginning with having complete visibility into all assets, including Cloud, IT and OT.
โAttackers leverage a variety of mechanisms including Active Directory misconfigurations or trust relationships as well as exploiting well known vulnerabilities that should have been remediated. It is only a matter of time before these typically IT oriented attacks begin to more dramatically impact OT systems directly and more organizations fall victim.
โWhat organizations should learn from this incident is that basic security principles can go a long way,โ Edwards said. โWithout implementing these, any business can and should expect disrupted core functions like manufacturing, shipping and more.โ
In a survey of IT execs and security leaders, 60 percent of respondents believe the threat of ransomware is on the same level as terrorism, according to Venafiโs Global Security Report.
Other findings include:
- 22 percent of respondents believe it is morally wrong to pay a ransom even if it seriously compromised critical systems of data.
- 77 percent are confident their current security tools will protect their organization from future attacks despite the fact that over two thirds have experienced a ransomware attack in the last year.
- 77 percent said they will increase spending on ransomware security controls over the next 12 months.
In addition, a global survey by security provider Claroty of 1,100 information technology (IT) and operational technology (OT) security 80 percent of respondents experienced a ransomware attack, with 47 reporting an impact to their OT/industrial control system (ICS) environment. In addition, over 60 percent paid the ransom and 52 percent paid $500,000 USD or more.
Conti is a Ransomware-as-a-Service (RaaS) operation linked to the Wizard Spider Russian cybercrime group, also known for other malware, including Ryuk, TrickBot, and BazarLoader.
The ransomware group’s affiliates breach targets’ networks after corporate devices get infected with BazarLoader or TrickBot malware, providing them remote access to the compromised system.
Associated Incidents
- UK Snack Provider Hit by Ransomware Attack January 28, 2022:
- December 10, 2021: Photography Giant Hit In Ransomware Attack