AkzoNobel Confirms US Site Breached; Anubis Ransomware Claims 170GB Data Theft

Paint Giant AkzoNobel Hit by Anubis Ransomware; 170GB of Client Data and Passports Leaked

HIGH
March 6, 2026
March 10, 2026
4m read
RansomwareData BreachCyberattack

Impact Scope

Affected Companies

AkzoNobel

Industries Affected

Manufacturing

Geographic Impact

United States (national)

Related Entities(initial)

Threat Actors

Anubis

Other

Full Report(when first published)

Executive Summary

Global paint and coatings manufacturer AkzoNobel has confirmed it was the victim of a cyberattack targeting one of its sites in the United States. The Anubis ransomware group, a Ransomware-as-a-Service (RaaS) operation, has taken responsibility for the breach. The threat actors claim to have stolen 170 GB of sensitive data and have begun leaking it on their dark web site to pressure the company. The leaked samples include confidential client agreements, technical product data, and highly sensitive employee personally identifiable information (PII), including passport scans. The incident highlights the continued threat of double-extortion ransomware to the manufacturing sector.

Threat Overview

The attack was carried out by the Anubis ransomware group, which has been active since at least December 2024. Anubis operates a RaaS model, providing its malware and infrastructure to affiliates who execute the attacks. These affiliates receive a majority share (reportedly 80%) of any ransom payments, which incentivizes widespread and aggressive targeting. The group's primary tactic is double extortion:

  1. Data Exfiltration: Before encrypting files, the attackers steal large volumes of sensitive data.
  2. Data Encryption: They then deploy the ransomware to encrypt the victim's files, disrupting operations.
  3. Extortion: A ransom is demanded for both the decryption key and a promise to delete the stolen data. If the victim refuses to pay, the data is leaked publicly.

Technical Analysis

While the specific initial access vector for the AkzoNobel breach was not disclosed, RaaS affiliates like those used by Anubis typically employ a common set of TTPs:

  • Initial Access: Often gained through phishing emails with malicious attachments, exploiting unpatched vulnerabilities in public-facing systems (e.g., VPNs, RDP), or using credentials purchased from initial access brokers.
  • Lateral Movement: Once inside, they use tools like Cobalt Strike and legitimate admin utilities to move across the network, escalating privileges and identifying high-value data repositories.
  • Data Exfiltration (T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage): Attackers stage and then exfiltrate large quantities of data to attacker-controlled cloud storage before deploying the ransomware.
  • Impact (T1486 - Data Encrypted for Impact): The ransomware payload is executed across as many systems as possible to maximize disruption and pressure the victim into paying.

Impact Assessment

The breach at AkzoNobel has significant business consequences:

  • Data Breach and PII Exposure: The leak of employee passport scans and other PII creates a high risk of identity theft and triggers regulatory obligations under data protection laws.
  • Intellectual Property Theft: The exfiltration of technical product specifications and material testing documents could expose valuable trade secrets to competitors or other malicious actors.
  • Reputational Damage: The public disclosure of confidential agreements with major clients can damage business relationships and customer trust.
  • Operational Disruption: Although AkzoNobel stated the incident was contained, the attack still caused disruption at the affected U.S. site, impacting manufacturing or research activities.
  • Financial Loss: The incident incurs costs from incident response, remediation, potential regulatory fines, and potential loss of business.

Detection & Response

  • Detect: Monitor for signs of a RaaS intrusion, including EDR alerts for tools like Cobalt Strike, Mimikatz, or BloodHound. Watch for large, unexpected data egress to cloud storage providers or other unknown destinations. Set up alerts for the creation of new administrative accounts.
  • Respond: If a ransomware attack is suspected, immediately execute the incident response plan. Isolate affected network segments to prevent further spread. Secure backups by taking them offline to ensure they are not targeted. Do not power off encrypted systems until a forensic analysis can determine if volatile memory contains encryption keys.

Mitigation

  1. Multi-Factor Authentication (MFA): Enforce MFA on all remote access points (VPNs, RDP), email accounts, and critical internal systems to prevent initial access via compromised credentials.
  2. Patch Management: Maintain an aggressive patch management program to close vulnerabilities in public-facing systems and internal software before they can be exploited.
  3. Immutable Backups: Implement a 3-2-1 backup strategy with at least one offline, immutable, or air-gapped copy of critical data. Regularly test backup restoration procedures.
  4. Network Segmentation: Segment the network to limit an attacker's ability to move laterally from an initial point of compromise. Isolate the manufacturing/OT network from the corporate IT network.
  5. Data Loss Prevention (DLP): Deploy DLP solutions to monitor and block unauthorized exfiltration of sensitive data identified by content-aware policies.

Timeline of Events

1
March 6, 2026
This article was published

Article Updates

March 10, 2026

AkzoNobel clarifies operational impact of Anubis ransomware attack as minimal.

MITRE ATT&CK Mitigations

Having tested, offline backups is the most effective way to recover from a ransomware attack without paying the ransom.

Enforcing MFA on remote access services and critical accounts can prevent many initial access attempts that rely on stolen credentials.

Audit

M1047enterprise

Auditing for large file transfers and anomalous account activity can help detect an intrusion before the final ransomware payload is deployed.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AnubisRansomwareAkzoNobelData LeakManufacturingRaaSDouble Extortion

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.