On January 25, 2026, global logistics provider NaviGistics was hit by a severe ransomware attack, crippling its worldwide operations. The attack was carried out by a new threat group, Entropy Collective, using a previously unseen ransomware variant named QuantumLeap. The attackers encrypted critical servers, halted the company's core logistics platform, and exfiltrated over 2 terabytes of sensitive data. A ransom of $50 million has been demanded to prevent the public release of the stolen information and to provide a decryptor. The initial infection vector was a compromised VPN account without multi-factor authentication, highlighting a critical security gap. The incident has caused a complete shutdown of NaviGistics' shipping, tracking, and freight forwarding services, with recovery expected to take weeks and result in significant financial losses.
Threat Actor: Entropy Collective (newly identified group) Malware: QuantumLeap (new ransomware strain) Victim: NaviGistics, a global logistics and shipping company Impact: Global operational shutdown, data encryption, data exfiltration, and a $50 million ransom demand.
The attack began with the compromise of a corporate VPN account that was not protected by multi-factor authentication. After gaining initial access, the Entropy Collective actors conducted a lengthy reconnaissance phase, moving laterally across the corporate network for several weeks to identify and map critical assets. Once they had established a deep foothold, they deployed the QuantumLeap ransomware across data centers in North America, Europe, and Asia. The ransomware is noted for its high speed and its ability to neutralize security defenses, including disabling endpoint protection software and deleting Volume Shadow Copies to frustrate recovery efforts. The attackers are employing a double-extortion tactic, leveraging the threat of releasing sensitive exfiltrated data to pressure NaviGistics into paying the ransom.
The attack chain followed a common but effective pattern for enterprise-wide ransomware deployment.
T1133 - External Remote Services).T1082 - System Information Discovery) to understand the network topology and identify high-value targets like domain controllers and backup servers.T1021.001 - Remote Desktop Protocol).T1562.001 - Disable or Modify Tools) on endpoints before encryption.T1041 - Exfiltration Over C2 Channel).T1486 - Data Encrypted for Impact) and deleted Volume Shadow Copies to prevent system recovery (T1490 - Inhibit System Recovery).The attack on NaviGistics has immediate and far-reaching consequences. Operationally, the complete shutdown of its logistics platform means shipments cannot be tracked, processed, or forwarded, causing a major disruption to the global supply chain for its numerous clients. Financially, the company faces direct costs from the incident response and recovery efforts, potential regulatory fines for the data breach, and significant revenue loss for every day its systems remain offline. The $50 million ransom demand represents a substantial financial threat. Reputational damage will be severe, as trust from customers is eroded due to the operational failure and the exposure of their sensitive shipping and financial data. Full recovery is projected to take weeks, if not months, given the complexity of the interconnected global network.
Security teams should hunt for the following activities associated with this type of attack:
| Type | Value | Description | Context |
|---|---|---|---|
command_line_pattern |
vssadmin.exe delete shadows /all /quiet |
Command to delete Volume Shadow Copies, inhibiting recovery. | Windows Endpoint Logs (ID 4688) |
network_traffic_pattern |
Large, anomalous data egress to unknown IP ranges. | Potential data exfiltration activity. | Netflow data, Firewall logs |
log_source |
VPN Authentication Logs | Multiple failed logins followed by a success from an unusual location. | VPN Concentrator Logs |
process_name |
PsExec.exe, wmic.exe |
Tools commonly used for lateral movement. | EDR / SIEM Process Creation Logs |
event_id |
4625 (Failed Logon), 4624 (Successful Logon) |
Correlating logon events to track lateral movement attempts. | Windows Security Event Log |
Defenders should focus on early-stage detection to prevent widespread impact.
User Geolocation Logon Pattern Analysis (D3-UGLPA).PsExec.exe or wmic.exe originating from non-administrative workstations. Monitor for an account making numerous logon attempts across multiple systems in a short period. D3FEND Technique: Remote Terminal Session Detection (D3-RTSD).vssadmin.exe delete shadows. D3FEND Technique: Process Analysis (D3-PA).Organizations should implement layered defenses to protect against similar attacks.
Multi-factor Authentication (D3-MFA).Network Isolation (D3-NI).Directly counters the initial access vector by requiring a second factor for VPN login.
Mapped D3FEND Techniques:
Limits the blast radius of an attack by preventing easy lateral movement between network zones.
Mapped D3FEND Techniques:
Restricts access to administrative accounts, making it harder for attackers to move laterally and deploy ransomware.
Mapped D3FEND Techniques:
Modern EDR solutions can detect and block ransomware behavior based on heuristics and known TTPs.
Mapped D3FEND Techniques:
Immediately enforce phishing-resistant Multi-Factor Authentication (MFA) on all external-facing services, with the highest priority on VPN gateways, remote desktop access, and cloud administration portals. This single control would have prevented the initial access vector used by Entropy Collective against NaviGistics. Organizations should prioritize FIDO2/WebAuthn hardware tokens or authenticator apps with number matching and push notifications over less secure methods like SMS or simple push approvals. For legacy systems that do not support modern MFA, they should be isolated behind an application proxy or gateway that can enforce MFA. A phased rollout should begin with privileged users (administrators, executives) and users with access to critical systems within 24-48 hours, with a goal of 100% coverage for all remote access within 30 days. This is a foundational, high-impact mitigation that directly hardens the perimeter against credential-based attacks.
Implement a robust network segmentation strategy to contain threats and limit an attacker's ability to move laterally. In the context of the NaviGistics attack, this means ensuring that a compromise in the corporate IT environment cannot easily spread to critical operational technology (OT) networks or high-value data centers. Create distinct security zones for user workstations, servers, databases, and management interfaces. At a minimum, establish a 'crown jewels' network segment for the most critical assets, like the core logistics platform, and enforce a default-deny policy on firewalls, only allowing explicitly authorized traffic to and from this zone. This strategy limits the blast radius of a ransomware attack, preventing a single entry point from leading to a total enterprise-wide shutdown. It transforms a catastrophic event into a more manageable, contained incident.
Deploy an Endpoint Detection and Response (EDR) solution capable of advanced process analysis and behavioral monitoring. This is critical for detecting ransomware TTPs that QuantumLeap employed, such as disabling security tools and deleting shadow copies. Configure the EDR to specifically alert on and, if possible, block processes that attempt to tamper with security agent services. Create high-severity alerts for the execution of vssadmin.exe delete shadows, wbadmin.exe delete catalog, or similar commands associated with inhibiting system recovery. By monitoring parent-child process relationships and command-line arguments, security teams can detect malicious activity that signature-based antivirus would miss. This provides a crucial last line of defense on the endpoint to stop the ransomware payload before it can execute and encrypt files.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats