Recipe Unlimited denies a ransomware attack impacted nine restaurant brands, despite an alleged ransom note that shows the bitcoin ransom demand ticking up daily. Credit: Thinkstock Recipe Unlimited, which operates 19 franchise restaurant brands, must think that claiming to be a victim of a “malware outbreak” sounds better than saying it was a victim of a ransomware attack. Nevertheless, nine of its restaurant brands were impacted by the attack, and some have even closed as the bitcoin ransom demand total grows higher each day.Corporate said that after the attack (“malware outbreak”), which happened on Friday, Sept. 28, it tried to stop the spread of the ransomware by taking several of its systems offline and suspending internet access to affected locations.That, in turn, resulted in some restaurants completely closing up shop because – in the words of a note taped to East Side Mario’s – “the head office computer was hacked.” The full note posted on Sept. 30 stated, “Due to a computer issue with Head Office we are closed for the day.” Smaller handwritten info included: “That is 1,400 of our restaurants closed for the day. The head office computer was hacked.”In total, nine Recipe Unlimited restaurant brands were impacted by the attack: Swiss Chalet, Harvey’s, Milestones, Kelseys, Montana’s, Bier Markt, East Side Mario’s, The Landing Group of Restaurants, and Prime Pubs brands. If you are unfamiliar with those restaurants, it might be because 1,318 of all 1,379 Recipe Unlimited restaurants are located in Canada. At any rate, the impacted restaurants that did not temporarily close were not able to accept credit or debit transactions.Ransom increases dailyDespite the company avoiding the words “ransomware attack,” CBC reported seeing the ransom note, which “informs Recipe Unlimited that ‘there is a significant hole in the security of your company’ and that ‘we’ve easily penetrated your network.’” Instead of being a fixed price, the ransom demand increases every day. The note states, “The final price depends on how fast you write to us. Every day of delay will cost you additional +0.5 BTC.”As of the time of writing, .5 bitcoin was equal to $3,224.58. If the countdown started on Friday and today is Wednesday, that total ransom demand for six days has jumped up to $19,347.If Recipe Unlimited opts to pay the ransom, the attackers’ note promised to give the “decrypted data back,” as well as instructions for “how to close the hole in security” and “avoid such problems in the future.”Recipe Unlimited, however, denied to CBC that it was being held ransom. In a press release, the company claims, “We maintain appropriate system and data security measures and as per standard operating procedures, conduct regular system back-ups to enable us to restore impacted systems.” It is working “with third-party security experts and internal teams to resolve the situation as quickly and effectively as possible.”As for the ransom demand, Recipe Unlimited claims it was “a ‘generic’ statement associated with a virus called Ryuk and that exact copies of the ransom note can be found via a Google search.”While detailing a targeted Ryuk ransomware campaign, Check Point Research posted two version of the Ryak ransom note. As of August, Check Point believes the attackers had racked up $640,000 from ransoms. The security firm believes the Ryak and Hermes ransomware were related and wondered about the connection to North Korean Lazarus Group attackers. As for concerned employees with no clue what is happening or if their data is in the hands of hackers, Recipe Unlimited claimed, “We have no indication that this limited malware incident has resulted in any data breach.”Key takeaways might include the obvious: Make sure you have recent offsite backups, as well as man up if you are hit with a ransomware attack instead of trying to claim it is a “malware outbreak,” which led to the temporary closing of some businesses. The truth will come out sooner or later, so lying won’t help in the long run. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe