Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. HellCat Ransomware Group Breaches Ascom, Exfiltrates 44GB
HellCat Ransomware Group Breaches Ascom, Exfiltrates 44GB
NEWS

HellCat Ransomware Group Breaches Ascom, Exfiltrates 44GB

The HellCat ransomware group has breached Swiss enterprise communications provider Ascom by exploiting Jira credentials harvested through infostealer...

Dylan H.

News Desk

February 23, 2026
7 min read

HellCat's Jira Exploitation Campaign Claims Another Victim

The HellCat ransomware group has breached Ascom, a Swiss enterprise communications and technology provider, by exploiting Jira credentials harvested through infostealer malware. The group claims to have exfiltrated approximately 44GB of sensitive enterprise data — including source code, project details, contracts, invoices, and confidential documents — from Ascom's technical ticketing infrastructure.

This breach is part of HellCat's broader campaign targeting Atlassian Jira servers worldwide, which has previously claimed victims including Schneider Electric, Telefonica, Orange Group, and Jaguar Land Rover (JLR). The group, which emerged as a Ransomware-as-a-Service (RaaS) operation in Q4 2024, has rapidly established itself as a significant enterprise threat by specializing in a specific and repeatable attack chain: stolen Jira credentials obtained from infostealer infections.


Breach Details

AttributeValue
VictimAscom Holding AG (Swiss enterprise communications)
Threat ActorHellCat (Ransomware-as-a-Service group)
Data Exfiltrated~44GB
Data TypesSource code, project details, contracts, invoices, confidential documents, ticketing system issues
Initial AccessJira credentials harvested via infostealer malware
Target SystemAtlassian Jira (technical ticketing infrastructure)
HellCat EmergenceQ4 2024
Other Notable VictimsSchneider Electric, Telefonica, Orange Group, Jaguar Land Rover
Ascom StatementTicketing system compromised; no impact on business operations

How the Attack Worked

Phase 1: Credential Harvesting via Infostealers

HellCat's signature technique begins outside the target organization:

  1. Infostealer malware (such as Lumma, RedLine, or Raccoon) infects employee personal or corporate devices through phishing, malvertising, or trojanized software
  2. The infostealer harvests saved credentials from browsers, password managers, and system credential stores
  3. Among the stolen credentials are Atlassian Jira login details — usernames and passwords for the organization's project management platform
  4. These credentials are sold on dark web marketplaces or used directly by HellCat operators

Phase 2: Jira Access and Lateral Movement

With valid Jira credentials in hand:

  1. HellCat operators authenticate to the target's Jira instance — often accessible via the internet
  2. From within Jira, the attackers gain access to:
    • Source code repositories linked to Jira projects
    • Internal project documentation and technical specifications
    • Contracts, invoices, and financial documents attached to tickets
    • Employee information from ticket assignments and comments
  3. The attackers escalate privileges where possible, moving from Jira to adjacent systems
  4. Data exfiltration occurs over an extended period — in Ascom's case, totaling 44GB

Phase 3: Extortion

Following data exfiltration:

  1. HellCat publicly claims the breach on their leak site and in direct communications
  2. The group threatens to publish the stolen data unless a ransom is paid
  3. Victims face pressure from regulatory exposure, competitive intelligence loss, and reputational damage

What Was Stolen

The 44GB of exfiltrated data reportedly includes:

Data CategoryDescription
Source codeCode for multiple Ascom products
Project documentationInternal project details, specifications, and roadmaps
ContractsBusiness agreements and partnership documents
InvoicesFinancial records and billing information
Confidential documentsInternal communications and proprietary information
Jira ticketsIssue tracker data including technical discussions and attachments

Impact Assessment

Impact AreaDescription
Intellectual property theftSource code exfiltration exposes proprietary technology and potential vulnerabilities
Competitive intelligenceProject roadmaps and contracts reveal strategic business information
Supply chain riskAscom's enterprise customers may be indirectly exposed through leaked integration details
Regulatory exposureSwiss and EU data protection regulations may apply to exfiltrated personal data
Customer confidenceEnterprise clients relying on Ascom's communication solutions face trust concerns
Broader Jira campaignDemonstrates HellCat's repeatable attack chain works at enterprise scale

HellCat: An Emerging RaaS Threat

HellCat has rapidly grown since its emergence in late 2024, distinguishing itself through a focused attack methodology targeting Atlassian Jira:

DateVictimData Claimed
Late 2024Schneider Electric40GB+ of project data via Jira
Early 2025TelefonicaInternal ticketing and project data
Q1 2025Orange GroupCorporate data via Jira credentials
Q1 2025Jaguar Land Rover (JLR)Internal documents and source code
2026Ascom44GB including source code and contracts

The group's specialization in Jira-focused attacks using infostealer-harvested credentials makes them particularly effective because:

  • Jira is ubiquitous in enterprise environments for project management and ticketing
  • Credentials harvested by infostealers bypass traditional perimeter defenses
  • Jira instances often contain highly sensitive data (source code, architecture docs, customer details)
  • Many organizations do not enforce MFA on Jira access, especially for internal-facing instances

Ascom's Response

Ascom has confirmed the breach and released a public statement:

"The hackers compromised our technical ticketing system. The incident had no impact on the company's business operations, and customers and partners do not need to take any preventive action."

The company is working with incident response teams to assess the full scope of the breach and has notified relevant authorities.


Recommendations

For IT Administrators

  1. Enforce MFA on all Atlassian Jira instances — This is the single most effective defense against credential-based attacks
  2. Restrict Jira access to VPN or internal networks — Do not expose Jira directly to the internet
  3. Audit Jira permissions — Apply least-privilege access to projects, repositories, and attachments
  4. Monitor for credential leaks — Subscribe to breach notification services and scan dark web marketplaces for leaked employee credentials
  5. Review Jira access logs — Look for unusual login patterns, geographic anomalies, or bulk data access

For Security Teams

  1. Deploy infostealer detection — Monitor endpoints for known infostealer families (Lumma, RedLine, Raccoon, Vidar)
  2. Implement credential monitoring — Use services that detect when employee credentials appear on dark web forums
  3. Audit Jira data classification — Identify and restrict sensitive data (source code, contracts, PII) stored in Jira
  4. Enable session controls — Implement session timeout and IP-based access restrictions for Jira
  5. Prepare for HellCat TTPs — The group's Jira-focused attack chain is well-documented and repeatable
  6. Review third-party integrations — Ensure Jira plugins and integrations do not expose additional attack surface

Key Takeaways

  1. HellCat breached Ascom via infostealer-harvested Jira credentials, exfiltrating 44GB of sensitive data
  2. Stolen data includes source code, contracts, and invoices — representing significant IP and business intelligence loss
  3. HellCat specializes in Jira-targeted attacks — Schneider Electric, Telefonica, Orange, and JLR were previous victims
  4. Infostealer-to-Jira is a repeatable attack chain — Credentials stolen from employee devices bypass perimeter defenses
  5. MFA on Jira is essential — Most HellCat attacks succeed because Jira instances lack multi-factor authentication
  6. Jira contains far more sensitive data than most organizations realize — Source code, architecture docs, and customer details are commonly stored in project tickets

Sources

  • BleepingComputer — HellCat Hackers Go on a Worldwide Jira Hacking Spree
  • SecurityWeek — Ransomware Group Claims Attacks on Ascom, Jaguar Land Rover
  • Cybersecurity News — HellCat Ransomware Group Hacked Ascom Technical Ticketing System
  • SC Media — Global Jira Targeting Conducted by HellCat as Ascom Confirms Breach
#Ransomware#Hellcat#Ascom#Data Breach#Enterprise#Ticketing Systems

Related Articles

Malaysia Airlines Listed by Qilin Ransomware Group — Passenger Data at Risk

The Qilin ransomware-as-a-service group has listed Malaysia Airlines on its leak site, claiming access to passenger records, personnel files, and...

4 min read

Two US Cybersecurity Professionals Plead Guilty to BlackCat Ransomware Attacks

Former incident responder Ryan Goldberg and ransomware negotiator Kevin Martin admitted to running ALPHV/BlackCat ransomware operations against five US...

3 min read

Marquis Fintech Breach Exposes 672,000 Banking Customers via SonicWall Exploit

Plano-based fintech vendor Marquis disclosed that a ransomware attack exploiting a SonicWall firewall vulnerability compromised Social Security numbers,...

4 min read
Back to all News