Pakistan’s major utility company K-Electric restores services after ransomware attack

Pakistani technicians work on high voltage power lines in Karachi on Aug. 11, 2009. (AFP/File)
Short Url
Updated 11 September 2020
Follow

Pakistan’s major utility company K-Electric restores services after ransomware attack

  • Netwalker operators demanded $3.85 million to be paid in bitcoins within seven days or the amount would increase to $7.7 million
  • KE customers were unable to lodge complaints about power failures or obtain duplicate bills from its website

KARACHI: K-Electric (KE), the biggest electricity provider in Pakistan’s southern metropolis Karachi, on Friday afternoon announced it had restored customer services, after a cyberattack demanding a $3.85 million ransom payment.
The Netwalker ransomware attack on Monday disrupted KE’s billing and online services. It was only on Wednesday that the utility company serving around 2.5 million customers admitted that its services had been hacked. Information security and technology news publication BleepingComputer.com reported that the ransomware operators demanded $3.85 million to be paid in bitcoins.

“All customer services, including bill payment solutions and 118 call center, are operational and fully functional, to ensure the integrity of our systems, as a precautionary measure, we have isolated few non-critical services,” KE said in a statement on its website on Friday. 

According to BleepingComputer.com, a partner of the “No More Ransom” initiative by the National High-Tech Crime Unit of the Netherlands’ police, European Cybercrime Center, Kaspersky and McAfee, the attackers said the ransom amount would increase to $7.7 million if the $3.85 million was not paid by KE within seven days.

It is not clear whether the company paid the ransom. KE officials did not respond to Arab News despite repeated requests for comment. KE announced that its teams are in consultation with international information security experts and local authorities. 

Following the attack, customers were unable to lodge complaints about power failures through the KE 118 helpline, 8119 SMS service and KE Live App, or obtain duplicate bills from its website.
Cybersecurity experts say such ransomware attacks are launched due to internal security lapses. 
“These attacks are launched through a computer virus that encrypts computer data,” Qazi Mohammad Misbahuddin Ahmed, CEO of cybersecurity services provider Pakistan Computer Emergency Response Team (PakCERT) told Arab. “Attack is triggered with the use of infected USB or downloaded files.”
“Every day, ransomware operators get payments through attacks ranging from few hundred to millions of dollars from individuals and companies,” Ahmed said, “They have obviously demanded big amount from KE being a big company.” 
If targeted companies have backup or security software, they can immediately restore their services. Otherwise, they are forced to pay the ransom.
“The encryption that ransomware operators use normally could not be broken, it’s almost impossible. Victims are left with two choices: either to rebuild entire data or pay the ransom. Usually big companies even pay the ransom as they can’t restore critical data,” Ahmed said. 
KE is run by Abraaj Group and Aljomaih/NIG with 66.4 percent stakes. The Pakistani government’s shareholding stands at 24.4 percent.


Pakistani man convicted in US in political assassination plot tied to Iranian paramilitary

Updated 07 March 2026
Follow

Pakistani man convicted in US in political assassination plot tied to Iranian paramilitary

  • Asif Merchant, 47, worked for Pakistani banks for decades before going into clothing and other businesses
  • He testified he met a Revolutionary Guard operative who gave him countersurveillance training, assignments

NEW YORK: A Pakistani business owner who tried to hire hit men to kill a US politician was convicted Friday in a trial that showcased allegations of Iran-backed plotting on American soil.

As the Iran war unfolded in the Mideast, Asif Merchant acknowledged in a US court that he sought to put an assassination in motion during the 2024 presidential campaign — a plot that was quickly disrupted by American investigators before it had a chance to proceed.

A jury in Brooklyn convicted Merchant on terrorism and murder for hire charges.

The verdict after only a couple hours of deliberations followed a weeklong trial that included remarkable testimony from Merchant himself.

Merchant told the jury he was carrying out instructions from a contact in the Islamic Republic’s powerful paramilitary Revolutionary Guard. According to Merchant, the handler never specified a target but broached names including then-candidate Donald Trump, then-President Joe Biden and Nikki Haley, the former UN ambassador who was also in the race for a time.

The Iranian government has denied trying to kill US officials.

The nascent plot fell apart after Merchant showed an acquaintance what he had in mind by using objects on a napkin to depict a shooting at a rally. He asked the man to help him hire assassins. Instead, he was introduced to undercover FBI agents who were secretly recording him, as had the acquaintance.

Merchant told the supposed hit men he needed services that could include killing “some political person” and paid them $5,000 in cash in a parked car in Manhattan.

“This man landed on American soil hoping to kill President Trump — instead, he was met with the might of American law enforcement,” US Attorney General Pam Bondi said in a statement released after the conviction.

Merchant’s attorney, Avraham Moskowitz, didn’t immediately reply to a message seeking comment.

Merchant, 47, worked for Pakistani banks for decades before going into clothing and other businesses. He has two families, in Pakistan and Iran, and he sometimes visited the US for his garment business.

Merchant testified that he met a Revolutionary Guard intelligence operative about three years ago. The contact gave him countersurveillance training and assignments including the assassination scheme, Merchant said.

He maintained that he had to do his handler’s bidding to protect loved ones in Iran. The defendant said he reluctantly went through the motions but thought he’d be arrested and explain his situation to authorities before anyone was killed.

“I was going along with it,” he said, speaking in Urdu through a court interpreter.

Prosecutors emphasized that Merchant admitted taking steps to enact the plan on behalf of the Revolutionary Guard, which the US considers a foreign terrorist organization, and he didn’t proactively go to authorities.

Instead, he was packing for a flight to Pakistan when he was arrested on July 12, 2024, a day before an unrelated attempt on Trump’s life in Butler, Pennsylvania. Officials said it appeared the Butler gunman acted alone but that they had been tracking a threat on Trump’s life from Iran, a claim that the Islamic Republic called “unsubstantiated and malicious.”

When Merchant subsequently spoke to FBI agents to explore the possibility of a cooperation agreement, he didn’t say he had acted out of fear for his family.

Prosecutors argued that he didn’t back up a defense of acting under duress. Merchant sought to persuade jurors he simply didn’t think the agents would believe him because they seemed to “think that I am some type of super-spy,” which he said he was “absolutely not.”