2026 Futuriom 50: Highlights →Explore

Executive Summary

In early March 2026, AkzoNobel, a leading multinational paint and coatings company, experienced a cyberattack at one of its U.S. sites. The Anubis ransomware group claimed responsibility, asserting they had exfiltrated 170GB of sensitive data, including confidential client agreements, personal employee information, and internal technical documents. AkzoNobel confirmed the breach, stating it was contained to the specific site and that the impact was limited. The company is collaborating with relevant authorities and has initiated notifications to affected parties.

This incident underscores the evolving tactics of ransomware groups like Anubis, which have expanded their operations to include data exfiltration and destruction, increasing pressure on victims. Organizations must remain vigilant, as such attacks highlight the critical need for robust cybersecurity measures and incident response plans to mitigate potential damages.

Why This Matters Now

The AkzoNobel breach highlights the escalating threat posed by ransomware groups employing data exfiltration and destruction tactics. Organizations must prioritize comprehensive cybersecurity strategies to protect sensitive information and maintain operational integrity.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The Anubis ransomware group claimed to have stolen 170GB of data, including confidential client agreements, personal employee information, and internal technical documents.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Implementing Aviatrix Zero Trust CNSF could have significantly limited the Anubis ransomware group's ability to escalate privileges, move laterally, and exfiltrate data within AkzoNobel's network.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: While initial access via phishing may still occur, subsequent malicious activities would likely be constrained, reducing the attacker's ability to exploit the network.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The attacker's ability to escalate privileges would likely be constrained, reducing their capacity to disable security mechanisms and access sensitive data.

Lateral Movement

Control: East-West Traffic Security

Mitigation: The attacker's lateral movement would likely be restricted, reducing their ability to compromise additional systems within the network.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The establishment of command and control channels would likely be detected and disrupted, reducing the attacker's ability to maintain persistent access.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: The exfiltration of large volumes of data would likely be detected and blocked, reducing the risk of data loss.

Impact (Mitigations)

The attacker's ability to encrypt and threaten to leak data would likely be constrained, reducing the effectiveness of their ransom demands.

Impact at a Glance

Affected Business Functions

  • Research and Development
  • Supply Chain Management
  • Customer Relationship Management
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

Confidential agreements with high-profile clients, email addresses and phone numbers, private email correspondence, passport scans, material testing documents, and internal technical specification sheets.

Recommended Actions

  • Implement advanced email filtering and user training to mitigate spear-phishing attacks.
  • Enforce strict privilege management and regular audits to prevent unauthorized privilege escalation.
  • Deploy network segmentation and monitoring to detect and prevent lateral movement.
  • Establish robust command and control detection mechanisms to identify and disrupt unauthorized communications.
  • Implement data loss prevention strategies and regular backups to mitigate the impact of data exfiltration and encryption.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image