Russia’s largest alcohol company’s retail store, Vinlab, has closed its store after a cyber attack that is affecting its operation and causing procurement problems to its customers.
Its native company, Novabev Group said earlier this week that hackers broke their IT system.
“On July 14, the group was subjected to an unprecedented cyber attack-a massive and coordinated operation by Hackers,” the company Said,
“As a result of the event, parts of the IT infrastructure were temporarily disrupted, affecting the availability of some services and equipment used by the group and the VIIB series.”
Novabiv also said that the attackers requested the ransom payment but the company refused to engage and said it would not follow the demands.
The demand for a ransom usually indicates that the danger actor stole data from the company network or encrypted system, but the Novabiv Group did not provide additional details.
Since the company’s IT team works around the clock to solve the problems created by cyber attacks, the website remains offline as publication, and shopping through the mobile app is also likely to be affected.

Source: Bleepingcomputer
The most famous is Beluga, the most famous of the various alcohol brands for Novabev Rum, Vodka, Kadwa, Brandy, Gin, Tequila and Vermouth.
Russia’s largest liquor shop
Wineelab (Vinlab in Russian) is one of the largest alcohol specialty retail chains in Russia, with thousands of physical stores and an important appearance online. By June 2025, the company reported operations of at least 1,800 places across the country. In April, Interfax reported that Wineelab increased its network in 2023, running 2,041 stores.
The retail store in Russia is so big that the cyber attack on its system is also discussed on the hacker forums, saying that the online delivery system does not work.
As Reports From the national media, the Wineelab Store has also been closed from Monday, July 14, the day the company’s website has also been closed.
Novabev said that there is no evidence that the customer was affected by personal data, although the investigation is still going on. At this time, no ransomware groups have claimed an attack.
Most of the major ransomware groups originating from Russia avoid targeting institutions located in the country and in the CIS region. However, this rule is being ignored as much as possible. Some examples are low-level RAAS operations, NB65 actors use leaked Conty Code, and Oldgraminaline Threat Group.
Organizations in Russia are also a goal for danger actors outside the country. For example, in May 2022, Ukrainian hecticians attacked a major liquor distribution system in Russia, called EGAIS (егаис), which led to the lack of real products on the shelves of retail shops across the country after a few days.
CISOS knows how to purchase a board begins with a clear, strategic approach how the cloud safety runs the business price.
This helps to introduce the risk, impact and priorities to the free, editable board report deck deck security leaders in clear business terms. Convert security updates into meaningful conversations and take fast decision in boardroom.