Romanian national water agency hit by BitLocker ransomware attack

Romania’s national water management agency announced on Sunday being hit by a ransomware attack that left staff locked out of approximately 1,000 computer systems.

The attack has impacted equipment from workstations through to servers, but the National Directorate of Cyber Security said operational technologies, including hydrotechnical infrastructure such as dams and flood defenses, were unaffected.

Normal operations are continuing throughout the water agency’s infrastructure, albeit with staff being forced to use telephone and radio for their communications as the cyberattack has impacted email servers.

Unlike traditional ransomware attacks that introduce encryption software from outside of the host network, the Romanian authorities’ initial technical assessment was that the attackers in this instance had used the legitimate Windows tool BitLocker to attempt to hold the organization to ransom.

The use of so-called LOLBins (living off the land binaries) — such as existing Windows tools — helps attackers evade security controls when traversing and manipulating victims’ networks.

Research by Kaspersky Labs published last year identified a wave of such ransomware attacks targeting victims in Mexico, Indonesia and Jordan — including companies in steel and vaccine manufacturing, and a government entity.

Last year, cybersecurity company Bitdefender said the ShrinkLocker malware — a script being used to turn the legitimate BitLocker tool against system users — was being used by “multiple individual threat actors for simpler attacks” targeting legacy Windows systems.

According to the Romanian cybersecurity agency, the attackers have issued a ransom note demanding to be contacted within seven days. It stressed that its own “policy and strict recommendation” is that victims neither engage nor negotiate with cyber extortionists.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.

 

Total
0
Shares
Previous Post

⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Next Post

Nefilim ransomware hacker pleads guilty to computer fraud

Related Posts

North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

The North Korea-linked threat actors associated with the Contagious Interview campaign have been attributed to a previously undocumented backdoor called AkdoorTea, along with tools like TsunamiKit and Tropidoor. Slovak cybersecurity firm ESET, which is tracking the activity under the name DeceptiveDevelopment, said the campaign targets software developers across all operating systems, Windows,
Read More

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Deploys QWCrypt Ransomware

Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor between February 2024 and August 2025. The campaign is assessed with high confidence to share overlaps with a hacking group known as Gold Blade, which is also
Read More