coca cola ransomware attack reported

Even though Coca-Cola has long been a target for cybercriminals, the beverage giant now faces an unprecedented dual assault from sophisticated ransomware groups targeting both the company and its bottling partners.

The Everest ransomware gang claimed responsibility for breaching Coca-Cola’s systems, particularly targeting its Dubai Airport Free Zone office. At the same time, the Gehenna group launched an attack on Coca-Cola Europacific Partners (CCEP).

The May 2025 breaches, both confirmed on May 22, have exposed sensitive data from multiple corporate systems. Screenshots posted on dark web leak sites suggest the Everest gang accessed internal documents and personal information of 959 employees, including visa scans, passport details, salary data, and HR records.

Simultaneously, Gehenna claims to possess a massive database stolen from CCEP’s Salesforce environment.

The ransomware group Gehenna alleged theft of extensive data from Coca-Cola Europacific Partners’ Salesforce database during their cyberattack campaign.

Initial investigations reveal sophisticated attack methods, including credential harvesting and Active Directory targeting. A VP CISO Advisory at ColorTokens noted that Coca-Cola’s cybersecurity investments may have been insufficient to prevent such coordinated attacks. The attackers demanded 1.65 Bitcoin as ransom for the stolen data. With data breach costs averaging $4.35 million, the impact could be devastating for the company’s bottom line.

The incidents follow a concerning pattern of escalating threats against the company, including a 2022 attack by the Russia-supporting Stormous ransomware group, which claimed to have exfiltrated 161GB of critical data.

The company’s response follows its established protocol of coordinating with law enforcement while conducting internal investigations. This latest breach mirrors a previous incident where a former employee stole data affecting over 8,000 workers. Historically, Coca-Cola maintains minimal public communication during active investigations, as demonstrated by Vice President of Communications Scott Leith’s measured responses to previous incidents.

The simultaneous attacks represent an evolution in tactics against major corporations, with threat actors now coordinating assaults on both parent companies and their partners.

The targeted data spans critical operational information, potentially exposing trade secrets, and includes sensitive employee data from international operations.

This incident highlights the increasing sophistication of ransomware groups, who utilize dark web leak sites and public announcements to pressure companies into negotiations, marking a significant escalation in cyber threats against global beverage companies.

You May Also Like

Terrifying Signs Hackers Are Already Inside: Stop a Ransomware Attack Before It’s Too Late

Hackers might already control your network right now. Learn the 5 warning signs that reveal if you’re next on their ransomware hit list.

Elite Law Firms Under Siege: FBI Exposes Ruthless Silent Ransom Group Campaign

Elite law firms face devastating attacks as Silent Ransom Group wreaks havoc, causing $4.88M in damages and exposing confidential client data across the industry.

Ransomware Explodes 46% as Industrial OT Systems Become Prime Cybercrime Targets in 2025

Industrial systems are now cybercriminals’ favorite prey, with ransomware attacks skyrocketing 46% and wreaking $57 billion in damages. Your operations could be next.

Ransomware Exposed: Inside the Malware That Hijacks Systems—And How You Can Fight Back

Think ransomware only affects big corporations? A staggering $20 billion in global damages proves everyone’s at risk. Learn how to shield your data today.