Arkana Ransomware Group Claims Responsibility for Major Breach at WideOpenWest

In a significant cybersecurity incident, the newly emerged Arkana Security ransomware group has claimed responsibility for a substantial breach at WideOpenWest (WOW!), the eighth-largest cable operator and internet service provider in the United States. This attack has reportedly compromised over 403,000 customer accounts and granted the attackers control over critical backend systems.

Details of the Breach

Arkana Security announced on their dark web data leak site that they had “fully compromised Wide Open West (WOW!), gaining access to highly sensitive customer data and servers.” They further threatened, “If you fail to pay, the breach will go public. Your infrastructure is a complete disaster – your security is non-existent.” The group criticized WOW!’s security measures, stating that the systems were so poorly protected that it was evident no real effort had been made to secure them.

Compromised Platforms

The attackers claim to have gained full control over WOW!’s infrastructure by compromising two key platforms: AppianCloud and Symphonica. Symphonica is responsible for customer account management, while AppianCloud manages business process workflows. The credentials for these systems were reportedly harvested from an employee’s device infected with infostealer malware in September 2024. This suggests that the initial infection served as a foothold for the attackers to escalate their access within WOW!’s network.

Exposed Customer Data

Arkana Security claims to have exfiltrated two significant databases:

1. A database containing 403,000 user account details, including:
– Usernames
– Full names
– Passwords with salt
– Security questions and answers
– Email addresses
– Firebase authentication details
– Account status information
– Login history
– Various flags and other settings

2. A file named “resources_services.csv” containing 2.2 million records, including:
– Names
– Phone numbers
– Addresses
– Device information

To demonstrate their access, the group released a video showcasing their control over various company systems. Additionally, they leaked personal information allegedly belonging to WOW! CEO Teresa L. Elder, including phone numbers, email addresses, a physical address, and a Social Security number.

Threats and Extortion

Arkana Security operates on a three-phase extortion model: ransom demands, threatened data sale, and public information leaks. They have set a countdown timer, giving WOW! a limited time to respond to their demands. The group warned of “devastating reputational damage, a massive loss of customer trust,” and significant financial repercussions, including lawsuits and regulatory fines, if their demands are not met.

Origins of the Attack

Security researchers at Hudson Rock traced the origins of the Arkana ransomware attack to an infostealer infection on an employee’s computer in September 2024. This incident underscores the growing threat of infostealers as a precursor to ransomware attacks. The researchers noted that the credentials for critical systems, including the Symphonica admin panel and AppianCloud infrastructure, were harvested from this infected device.

Infostealers are a type of malware designed to steal credentials, authentication cookies, crypto wallets, and other sensitive data. These can then be sold on the dark web or used directly by threat actors to gain unauthorized access. The stolen credentials provided Arkana with a foothold in WOW!’s infrastructure, allowing them to move laterally within the network.

Security Implications

The fact that Arkana was able to access and control systems like Symphonica and AppianCloud suggests a lack of multi-factor authentication (MFA) and proper network segmentation. Security experts recommend that organizations implement infostealer monitoring and swift response strategies to detect malicious activity early. Immediate credential resets upon infection detection are also advised.

SOCRadar researchers warn WOW! customers of an elevated risk of identity theft, financial fraud, and malware infections. With access to personal details such as Social Security numbers and credit card information, affected individuals may need to monitor their financial accounts closely and consider additional protective measures like credit monitoring or identity theft protection.

About Arkana Security

Arkana Security is a newly emerged ransomware group that has claimed two victims, one of them being WOW!. Their Onion site hints at operations based on a three-phase model: ransom, sale, and data leak. At each stage, the gang attempts to coerce businesses into paying for the return of their compromised data. The group claims to force companies to confront their security failures, helping them address vulnerabilities and protect their future before the damage becomes irreversible.

Arkana used the Russian language in the published video and their website, which suggests Russian origins or affiliations.

Conclusion

This incident highlights the critical importance of robust cybersecurity measures, including the implementation of multi-factor authentication, regular monitoring for infostealer infections, and swift response strategies to detect and mitigate malicious activity. Organizations must prioritize these measures to protect sensitive customer data and maintain trust.