Romanian national water agency hit by BitLocker ransomware attack

Romania’s national water management agency announced on Sunday being hit by a ransomware attack that left staff locked out of approximately 1,000 computer systems.

The attack has impacted equipment from workstations through to servers, but the National Directorate of Cyber Security said operational technologies, including hydrotechnical infrastructure such as dams and flood defenses, were unaffected.

Normal operations are continuing throughout the water agency’s infrastructure, albeit with staff being forced to use telephone and radio for their communications as the cyberattack has impacted email servers.

Unlike traditional ransomware attacks that introduce encryption software from outside of the host network, the Romanian authorities’ initial technical assessment was that the attackers in this instance had used the legitimate Windows tool BitLocker to attempt to hold the organization to ransom.

The use of so-called LOLBins (living off the land binaries) — such as existing Windows tools — helps attackers evade security controls when traversing and manipulating victims’ networks.

Research by Kaspersky Labs published last year identified a wave of such ransomware attacks targeting victims in Mexico, Indonesia and Jordan — including companies in steel and vaccine manufacturing, and a government entity.

Last year, cybersecurity company Bitdefender said the ShrinkLocker malware — a script being used to turn the legitimate BitLocker tool against system users — was being used by “multiple individual threat actors for simpler attacks” targeting legacy Windows systems.

According to the Romanian cybersecurity agency, the attackers have issued a ransom note demanding to be contacted within seven days. It stressed that its own “policy and strict recommendation” is that victims neither engage nor negotiate with cyber extortionists.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Next Post

Nefilim ransomware hacker pleads guilty to computer fraud

Related Posts

Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data

Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI's ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to steal personal information from users' memories and chat histories without their knowledge. The seven vulnerabilities and attack techniques, according to Tenable, were found in OpenAI's GPT-4o and GPT-5 models. OpenAI has
Read More

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. "This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user's browser, which can be used outside the perimeter of the compromised infrastructure to access
Read More

JPCERT Confirms Active Command Injection Attacks on Array AG Gateways

A command injection vulnerability in Array Networks AG Series secure access gateways has been exploited in the wild since August 2025, according to an alert issued by JPCERT/CC this week. The vulnerability, which does not have a CVE identifier, was addressed by the company on May 11, 2025. It's rooted in Array's DesktopDirect, a remote desktop access solution that allows users to securely access
Read More