On March 1, 2026, the Vect ransomware group claimed a significant cyberattack against USHA International Limited, a prominent Indian manufacturing company. The threat actors posted the claim on their data leak site, stating that they had successfully breached the company's network and were in active negotiations. According to Vect, the compromised data includes sensitive employee information and data from core business systems, most notably the company's SAP Enterprise Resource Planning (ERP) database. The public claim and negotiation deadline are classic double-extortion tactics designed to pressure USHA into paying a ransom.
The Vect ransomware group is targeting large manufacturing firms to cause maximum operational disruption and data exposure. The compromise of a company's SAP system is particularly damaging, as ERP databases are the heart of a manufacturing operation, containing data on finance, supply chain, production, and human resources. By exfiltrating and encrypting this data, the attackers can effectively paralyze the business and hold its most critical information hostage.
The initial access vector for the Vect ransomware group is not specified in the report, but it likely involved common methods such as phishing, exploiting exposed remote services, or using stolen credentials. Once inside USHA's network, the attackers' primary objective was to gain access to the SAP environment. This would involve:
rclone to transfer data to cloud storage.The specific mention of SAP, CMS, and CMR databases indicates a targeted attack where the actors knew exactly what data would be most valuable and disruptive to the victim.
The impact of this attack on USHA International could be severe:
To detect such an attack, organizations should:
Maintaining tested, offline backups of critical databases like SAP is essential for recovery.
Isolating the SAP environment in a secure network enclave can prevent attackers from reaching it from a less secure part of the network.
Mapped D3FEND Techniques:
Strictly controlling and monitoring administrative access to SAP systems can prevent unauthorized data access and encryption.
Mapped D3FEND Techniques:
The compromise of a core SAP system, as claimed in the USHA attack, is a worst-case scenario. To prevent this, manufacturers must treat their SAP environment as a 'crown jewel' and place it within a highly isolated network segment. All network traffic into this segment must be denied by default, with firewall rules allowing only the specific, required communication from application servers and authorized administrative workstations. This microsegmentation approach ensures that even if an attacker compromises a user workstation on the corporate network, they do not have a direct path to the SAP servers. This containment is crucial for protecting the central nervous system of the manufacturing operation.
To detect an attack on an SAP database before it results in mass exfiltration, organizations should deploy a dedicated Database Activity Monitoring (DAM) solution. A DAM tool can monitor all queries and transactions in real-time, establishing a baseline of normal activity. It can then alert on anomalies that indicate an attack, such as a user account suddenly attempting to export entire tables, queries originating from an unauthorized application server, or attempts to create or modify privileged user accounts directly in the database. In the context of the Vect attack, a DAM could have detected the mass exfiltration of data from the SAP, CMS, and CMR databases, providing an early warning for the security team to intervene.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats