Leading phone repair and insurance firm collapses after paying crippling ransomware demand — Cutting 100+ employees to just eight wasn’t enough

Einhaus-Gruppe facing collapse
(Image credit: Einhaus-Gruppe GmbH on Facebook)

A leading mobile device insurance and service network has initiated insolvency proceedings in the wake of a cyberattack. Germany’s Einhaus Group was targeted by hackers in March 2023 and is understood to have paid a ransom(ware) fee of around $230,000 at the time, according to Wa.de and Golem.de (machine translations). However, the once large and successful company, with partnerships including Cyberport, 1&1, and Deutsche Telekom, struggled to recover from the service interruption and the obvious financial strains, which now appear to be fatal.

The ides of March

Of course, with operational systems down, there was an immediate impact on Einhaus. The police were involved promptly. However, the affected firm seems to have decided to pay the ransom, as it could see business losses/damages piling up – meaning continuing without the computer systems was untenable. Einhaus estimated that the hacker-inflicted damage to its business was in the mid-seven-figure range.

Einhaus-Gruppe facing collapse

(Image credit: Einhaus-Gruppe GmbH on Facebook)

Trying to recover

Wounded by the financial impacts of the loss of business and the ransom payment, Einhaus Group went forward with several drastic actions.

According to the sources, it once had a workforce of 170 people. However, due to the hacker action, the 100+ employees at the firm in mid-March 2023 were pruned to just eight (8). How it did this, when it also had to process its usual business administration and claims workloads 'by hand,' is hard to fathom.

The afflicted firm also sold its headquarters building in mid-2024 and liquidated various capital investments in an attempt to overcome its rough patch.

Law enforcement seizes, but continues to hold the ransom cash

Einhaus thought it saw light at the end of its dismal tunnel after it found out that three hacker suspects had been apprehended by German law enforcement.

In addition to any satisfaction that the likely ‘Royal’ perpetrators would face justice, the public prosecutor's office seized “crypto assets in the high six-figure euro range,” according to news sources in Germany.

This wasn’t the medicine that Einhaus Group needed, though. The firm was desperate to recover its ransom funds, but the prosecutor’s office refused to release the money until it had completed its investigation. Other ransomware victims continue to wait for refunds, too, we understand from the sources. It seems unlikely that those affected by the cybercriminals will recover all their funds, as the perpetrators will undoubtedly have spent some of the stolen money.

Einhaus Group has been attempting to sue for the return of its funds, but the authorities have rejected its pleas. Now, three companies associated with the group have formally entered insolvency proceedings. The next stage is often liquidation, but that isn’t inevitable. Last but not least, Wilhelm Einhaus (72) insists that he will not retire if the worst happens, according to a report by Wa.de. Instead, he will “start afresh.”

UK's 158-year-old haulage company faced a similar fate

Last week, we reported on a venerable 158-year-old UK-based transportation company collapsing in the wake of a ransomware attack. Northamptonshire-based Knights of Old (KNP) trucks are now off the road, and 700 people have lost their jobs, mainly due to a money-grasping cyberattack, named ‘Akira’ in a BBC report.

Follow Tom's Hardware on Google News to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

Mark Tyson
News Editor

Mark Tyson is a news editor at Tom's Hardware. He enjoys covering the full breadth of PC tech; from business and semiconductor design to products approaching the edge of reason.

  • M0rtis
    It seems like the company was horribly mismanaged and that was the main reason for its downfall.
    Reply
  • hotaru251
    after paying crippling ransomware demand


    Until companies stop paying ransomware they will keep happening.

    They thrive becasue people pay. If people straight up didnt pay the issue would become a lot less common as they'd end up wasting their time.
    Reply
  • USAFRet
    hotaru251 said:
    Until companies stop paying ransomware they will keep happening.

    They thrive becasue people pay. If people straight up didnt pay the issue would become a lot less common as they'd end up wasting their time.
    They pay, because they have no other means to reconstitute their operating data.
    They lack the 'other means', because they were to cheap and/or shortsighted to institute proper IT procedures.

    "proper IT procedures" that have been well known for decades.
    Reply
  • Joomsy
    USAFRet said:
    They pay, because they have no other means to reconstitute their operating data.
    They lack the 'other means', because they were to cheap and/or shortsighted to institute proper IT procedures.

    "proper IT procedures" that have been well known for decades.
    Sure, but as we can see here, paying didn't help them, either. That's where the real problem lies; there's no honor amongst thieves, and there's absolutely no guarantee that paying their ransom will result favorably for you. They still hold your data, and absolutely nothing stops them from leaking it. In reality, companies pay the ransom so shareholders don't shit in a sock. They care more about how they appear to them, rather than the general public. This is horrendously shortsighted, because public opinion is what makes money for the shareholders. They're taking a total gamble when paying, and the only way to win at this is to not play.
    Reply
  • Alex/AT
    M0rtis said:
    It seems like the company was horribly mismanaged and that was the main reason for its downfall.
    Yes. Downsizing from 100+ people to ~10 while you need to restart operations... they basically did kill themselves.
    Reply
  • USAFRet
    Joomsy said:
    Sure, but as we can see here, paying didn't help them, either. That's where the real problem lies; there's no honor amongst thieves, and there's absolutely no guarantee that paying their ransom will result favorably for you. They still hold your data, and absolutely nothing stops them from leaking it. In reality, companies pay the ransom so shareholders don't shit in a sock. They care more about how they appear to them, rather than the general public. This is horrendously shortsighted, because public opinion is what makes money for the shareholders. They're taking a total gamble when paying, and the only way to win at this is to not play.
    Oh, absolutely. The shortsightedness was not limited to their IT procedures.

    But....given proper procedures, they could have reconstituted in a couple of days. Without paying anything.
    Reply
  • ThatMouse
    I don't see how the hack had anything to do with their downfall. They apparently didn't understand how backups work.
    Reply
  • Starco
    A $230,000 fine on a $70,000,000 annual revenue is like paying a $230 fine for someone earning $70,000 per year. Sure, that's what made them go bankrupt.
    Reply
  • Dr3ams
    About once a month I get an email from some turd who's english is laughable. He or she starts it off with "you pervert" and then goes on some tirade about how they have installed a malware on my PC and can see all my dirty little secrets and will sieze my data and send my browser history to all my contacts if I don't cough up some bitcoin. First, it's hilarious. Second, these halfwits know nothing about my machine and the security measures I have installed. Third, I have nothing to hide and I regularly backup my data, so hit me with your best shot. There's an old saying that says "the wicked run when no one is chasing them". I'm not that.
    Reply
  • Daniel15
    Dr3ams said:
    who's english is laughable
    Their usage of bad English and outlandish claims is intentional. It ensures that only the most gullable people reply, reducing the number of people they need to reply to before finding a successful victim.
    Reply