Global paint and coatings manufacturer AkzoNobel has confirmed it was the victim of a cyberattack targeting one of its sites in the United States. The Anubis ransomware group, a Ransomware-as-a-Service (RaaS) operation, has taken responsibility for the breach. The threat actors claim to have stolen 170 GB of sensitive data and have begun leaking it on their dark web site to pressure the company. The leaked samples include confidential client agreements, technical product data, and highly sensitive employee personally identifiable information (PII), including passport scans. The incident highlights the continued threat of double-extortion ransomware to the manufacturing sector.
The attack was carried out by the Anubis ransomware group, which has been active since at least December 2024. Anubis operates a RaaS model, providing its malware and infrastructure to affiliates who execute the attacks. These affiliates receive a majority share (reportedly 80%) of any ransom payments, which incentivizes widespread and aggressive targeting. The group's primary tactic is double extortion:
While the specific initial access vector for the AkzoNobel breach was not disclosed, RaaS affiliates like those used by Anubis typically employ a common set of TTPs:
T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage): Attackers stage and then exfiltrate large quantities of data to attacker-controlled cloud storage before deploying the ransomware.T1486 - Data Encrypted for Impact): The ransomware payload is executed across as many systems as possible to maximize disruption and pressure the victim into paying.The breach at AkzoNobel has significant business consequences:
AkzoNobel clarifies operational impact of Anubis ransomware attack as minimal.
AkzoNobel has provided an update on the Anubis ransomware attack, clarifying that the operational impact at the affected U.S. site was minimal. This refines earlier reports which indicated the attack caused disruption, suggesting effective containment and incident response limited the overall business impact. The core details of the attack, including the 170GB data exfiltration by the Anubis group, remain consistent.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats