HighMarch 27, 2026
CRYPTO24 Ransomware Group Claims New Corporate Target ActionPower
Emerging ransomware group CRYPTO24 has claimed responsibility for a cyberattack against ActionPower, indicating potential data theft and system encryption. This development signals increased activity from the threat actor in the industrial sector.
IndustrialEnergyManufacturingCritical Infrastructure
On March 27, 2026, security researchers identified new claims by the ransomware group CRYPTO24 regarding a successful attack against ActionPower, demonstrating the group's continued focus on industrial and energy sector targets. The attack potentially involves both data theft and system encryption, following the double extortion model common among contemporary ransomware operations.
This incident represents a significant development in CRYPTO24's operational pattern, as it marks their first publicly claimed attack against a major industrial infrastructure provider in 2026. The timing and target selection suggest a strategic shift in the group's targeting methodology, potentially indicating a broader campaign against critical infrastructure sectors.
Key Findings
- On March 27, 2026, security researchers identified new claims by the ransomware group CRYPTO24 regarding a successful attack against ActionPower, demonstrating the group's continued focus on industrial and energy sector targets
- The attack potentially involves both data theft and system encryption, following the double extortion model common among contemporary ransomware operations
- This incident represents a significant development in CRYPTO24's operational pattern, as it marks their first publicly claimed attack against a major industrial infrastructure provider in 2026
- The timing and target selection suggest a strategic shift in the group's targeting methodology, potentially indicating a broader campaign against critical infrastructure sectors
Overview
The ransomware group CRYPTO24 has publicly claimed responsibility for a cyberattack against ActionPower, representing a significant threat to industrial and energy sector organizations. This development was first observed on March 27, 2026, through multiple threat intelligence channels.
Technical Analysis
While specific technical details of the attack vector remain under investigation, CRYPTO24's typical tactics, techniques, and procedures (TTPs) include:
- Initial access through phishing campaigns or exposed RDP services
- Lateral movement using stolen credentials
- Data exfiltration prior to encryption
- Deployment of custom ransomware payloads
Impact Assessment
The attack potentially impacts multiple sectors:
- Direct impact on industrial control systems and operations
- Supply chain implications for energy sector dependencies
- Potential exposure of sensitive corporate and operational data
Recommendations
Organizations should implement the following protective measures:
- Conduct immediate threat hunting activities focusing on CRYPTO24's known TTPs
- Review and restrict remote access services, especially RDP exposure
- Implement network segmentation for critical industrial control systems
- Enhance backup solutions and test recovery procedures
- Deploy multi-factor authentication across all remote access points
- Update incident response plans to address ransomware scenarios
Indicators of Compromise
While specific IoCs for this incident are still emerging, organizations should monitor for:
- Suspicious RDP connection attempts
- Unusual data transfer patterns
- Anomalous privileged account activities
- Unexpected system encryption events