Rankiteo Logo
Rankiteo
Analyze » Krispy Kreme » KRI1768390561

Incident Score: Analysis & Impact (KRI1768390561)

The details regarding individual company incidents & reports gives you full view from every side.

Rankiteo Score Impact Analysis

Rankiteo Incident Impact-105
Company Score Before Incident559 / 1000
Company Score After Incident454 / 1000
INCIDENT NUMBERKRI1768390561
Type of Cyber IncidentRansomware
ATTACK VECTORExploitation of vulnerabilities in SimpleHelp RMM software, Initial access brokers
DATA EXPOSEDTrue
INCIDENT DATE04/06/2025
STATUSOngoing

Key Highlights From The Incident Analysis

  • Timeline of Krispy Kreme's Ransomware and lateral movement inside company's environment.
  • Overview of affected data sets, including SSNs and PHI, and why they materially increase incident severity.
  • How Rankiteo’s incident engine converts technical details into a normalized incident score.
  • How this cyber incident impacts Krispy Kreme Rankiteo cyber scoring and cyber rating.
  • Rankiteo’s MITRE ATT&CK correlation analysis for this incident, with associated confidence level.

Full Incident Analysis Transcript

In this Rankiteo incident briefing, we review the Krispy Kreme breach identified under incident ID KRI1768390561.

The analysis begins with a detailed overview of Krispy Kreme's information like the linkedin page: https://www.linkedin.com/company/krispy-kreme, the number of followers: 131591, the industry type: Food and Beverage Services and the number of employees: 10305 employees

After the initial compromise, the video explains how Rankiteo's incident engine converts technical details into a normalized incident score. The incident score before the incident was 559 and after the incident was 454 with a difference of -105 which is could be a good indicator of the severity and impact of the incident.

In the next step of the video, we will analyze in more details the incident and the impact it had on Krispy Kreme and their customers.

A newly reported cybersecurity incident, "Play Ransomware Gang Activity", has drawn attention.

The Play ransomware gang has made roughly 900 victims over the past three years, engaging in double-extortion tactics that include exfiltrating victims’ data and leveraging it for extortion, in addition to encrypting systems.

The disruption is felt across the environment, affecting Windows systems and ESXi virtual machines, and exposing True.

In response, and stakeholders are being briefed through Victims contacted via unique @gmx.de or @web.de emails, and some via phone for extortion.

The case underscores how Ongoing, with advisories going out to stakeholders covering US and Australian government agencies released updated TTPs and warnings about the Play ransomware gang.

Finally, we try to match the incident with the MITRE ATT&CK framework to see if there is any correlation between the incident and the MITRE ATT&CK framework.

The MITRE ATT&CK framework is a knowledge base of techniques and sub-techniques that are used to describe the tactics and procedures of cyber adversaries. It is a powerful tool for understanding the threat landscape and for developing effective defense strategies.

MITRE ATT&CK® Correlation Analysis

Rankiteo's analysis has identified several MITRE ATT&CK tactics and techniques associated with this incident, each with varying levels of confidence based on available evidence. Under the Initial Access tactic, the analysis identified Exploit Public-Facing Application (T1190) with high confidence (90%), supported by evidence indicating exploitation of vulnerabilities in SimpleHelp RMM software (CVE-2024-57727, CVE-2024-57728, CVE-2024-57726) and Phishing: Spearphishing Attachment (T1566.001) with lower confidence (30%), supported by evidence indicating victims contacted via unique email addresses for extortion. Under the Execution tactic, the analysis identified Command and Scripting Interpreter: Windows Command Shell (T1059.003) with moderate to high confidence (80%), supported by evidence indicating eSXi variant includes command-line flags for targeted encryption and Exploitation for Client Execution (T1203) with high confidence (90%), supported by evidence indicating exploitation of SimpleHelp RMM flaws to execute arbitrary code. Under the Privilege Escalation tactic, the analysis identified Exploitation for Privilege Escalation (T1068) with high confidence (90%), supported by evidence indicating cVE-2024-57727/28/26 chained to gain administrator privileges. Under the Defense Evasion tactic, the analysis identified Obfuscated Files or Information: Software Packing (T1027.002) with moderate to high confidence (80%), supported by evidence indicating ransomware recompiled for each attack to evade detection and Indicator Removal: File Deletion (T1070.004) with moderate to high confidence (70%), supported by evidence indicating eSXi variant shuts down VMs and encrypts files. Under the Credential Access tactic, the analysis identified Brute Force: Password Guessing (T1110.001) with moderate confidence (50%), supported by evidence indicating initial access brokers may use brute force for RMM access. Under the Discovery tactic, the analysis identified File and Directory Discovery (T1083) with moderate to high confidence (70%), supported by evidence indicating eSXi variant targets VM-related files for encryption. Under the Lateral Movement tactic, the analysis identified Exploitation of Remote Services (T1210) with moderate to high confidence (80%), supported by evidence indicating exploitation of SimpleHelp RMM for lateral movement. Under the Collection tactic, the analysis identified Data from Local System (T1005) with high confidence (90%), supported by evidence indicating data exfiltration as part of double-extortion tactics. Under the Command and Control tactic, the analysis identified Application Layer Protocol: Web Protocols (T1071.001) with moderate to high confidence (70%), supported by evidence indicating likely use of C2 channels for ransomware deployment. Under the Exfiltration tactic, the analysis identified Exfiltration Over C2 Channel (T1041) with high confidence (90%), supported by evidence indicating sensitive data exfiltrated for extortion (900 victims). Under the Impact tactic, the analysis identified Data Encrypted for Impact (T1486) with high confidence (100%), supported by evidence indicating encryption of Windows/ESXi systems and VMs (double-extortion) and Inhibit System Recovery (T1490) with moderate to high confidence (80%), supported by evidence indicating eSXi variant shuts down VMs before encryption. These correlations help security teams understand the attack chain and develop appropriate defensive measures based on the observed tactics and techniques.

Initial Access
Exploit Public-Facing Application (90%)
Phishing: Spearphishing Attachment (30%)
Execution
Command and Scripting Interpreter: Windows Command Shell (80%)
Exploitation for Client Execution (90%)
Privilege Escalation
Exploitation for Privilege Escalation (90%)
Defense Evasion
Obfuscated Files or Information: Software Packing (80%)
Indicator Removal: File Deletion (70%)
Credential Access
Brute Force: Password Guessing (50%)
Discovery
File and Directory Discovery (70%)
Lateral Movement
Exploitation of Remote Services (80%)
Collection
Data from Local System (90%)
Command and Control
Application Layer Protocol: Web Protocols (70%)
Exfiltration
Exfiltration Over C2 Channel (90%)
Impact
Data Encrypted for Impact (100%)
Inhibit System Recovery (80%)

Sources & References