News

Arkana ransomware group claims breach of WideOpenWest systems, report

A previously unknown ransomware group known as Arkana has allegedly executed a large-scale data breach against WideOpenWest, Inc. (WOW!), one of the largest cable and broadband service providers in the United States.

The alarming incident, which was first revealed by vx-underground, a prominent cybersecurity research collective, has exposed critical vulnerabilities in WOW!’s infrastructure and compromised the sensitive information of over 403,000 customer accounts.

“Arkana ransomware group claims to have compromised “Wide Open West – WOW!”, one of the largest Internet Service Provider’s in the United States,” vx-underground stated in a post on X.

“First and foremost: we have never heard of Arkana ransomware group. We’ve seen some researchers mention them via their onion domain — but this appears to be their first victim. Their first victim is also a giant.”

Arkana, an emerging ransomware group with a distinctive three-phase extortion model—Ransom, Sale, and Leak—has made an aggressive debut in the cybercrime world. The group’s strategy, as outlined on their Onionsite, involves:

  • Ransom Phase: Companies are informed of the breach and given a limited window to prevent escalation.
  • Sale Phase: If no action is taken, the stolen data is sold on the dark web to the highest bidder.
  • Leak Phase: As a final measure, Arkana publicly releases the stolen data through a so-called “Wall of Shame,” designed to embarrass companies that fail to secure their systems.

The language used on Arkana’s dark web site, along with a recently posted video analyzed by vx-underground, suggests that the group may have Russian origins or affiliations, adding a layer of geopolitical concern to this growing crisis.

According to SOC Radar, Arkana claims to have gained extensive access to WOW!’s internal systems, demonstrating a level of sophistication that has alarmed cybersecurity experts. The group alleges control over critical backend infrastructures, including:

  • Symphonica System: Arkana claims that by infiltrating WOW!’s Symphonica system, it has the capability to push malicious software directly to customer devices, posing an unprecedented threat to subscriber security.
  • AppianCloud APIs: The attackers have allegedly gained access to AppianCloud’s backend, compromising APIs related to authentication, transaction processing, and business logic. This access could allow the manipulation of financial transactions, modification of customer data, and unauthorized access to sensitive billing information.

In addition to compromising WOW!’s internal systems, Arkana claims to have exfiltrated a vast trove of customer data.

The leaked information purportedly includes

  • Usernames and passwords
  • Security questions and answers
  • Service package details
  • Personally Identifiable Information (PII) such as Social Security Numbers (SSNs) and credit card information

In a further act of aggression, Arkana has allegedly engaged in doxxing activities targeting WOW!’s top executives, including the company’s CEO.

Personal information, including addresses, contact numbers, and the CEO’s Social Security Number, was reportedly published by the group. The names of key company directors, investor relations officers, and media relations personnel were also disclosed, although their sensitive information has not yet been released. However, given the extent of the breach, it is likely that their private details may also be at risk.

For WideOpenWest, this breach – if true – represents a catastrophic cybersecurity failure that could lead to significant regulatory and legal repercussions.

As a company that serves approximately 538,100 subscribers across 10 states, including Alabama, Florida, Georgia, Illinois, Indiana, Maryland, Michigan, Ohio, South Carolina, and Tennessee, WOW! now faces mounting scrutiny from federal and state regulatory bodies, along with the risk of costly class-action lawsuits.

For WOW!’s customers, the consequences of this breach could be devastating. With access to sensitive information such as SSNs, credit card details, and authentication credentials, affected individuals are at an increased risk of identity theft, financial fraud, and malicious exploitation.