BianLian Ransomware Hits McElroy Quirk & Burch Accounting Firm

Incident Date: Oct 24, 2024

Attack Overview
VICTIM
McElroy, Quirk & Burch, APC
INDUSTRY
Finance
LOCATION
USA
ATTACKER
Bianlian
FIRST REPORTED
October 24, 2024

BianLian Ransomware Group Targets McElroy, Quirk & Burch, APC

McElroy, Quirk & Burch, APC (MQB), a well-established accounting firm based in Lake Charles, Louisiana, has recently fallen victim to a cyberattack orchestrated by the notorious BianLian ransomware group. This incident underscores the growing threat of ransomware attacks on professional service firms, particularly those in the finance sector.

About McElroy, Quirk & Burch, APC

Founded in 1925, MQB is a mid-sized accounting firm employing approximately 35 professionals. The firm offers a comprehensive range of services, including tax planning and preparation, financial reporting and auditing, bookkeeping, family financial advising, litigation support, business valuation, and fraud prevention. MQB is recognized for its personalized service and commitment to high-quality standards, making it a key player in Louisiana's accounting industry.

Vulnerabilities and Attack Overview

Despite its strong reputation, MQB's extensive handling of sensitive financial data makes it an attractive target for cybercriminals. The BianLian ransomware group, known for its sophisticated attack strategies, exploited these vulnerabilities to gain unauthorized access to MQB's systems. The attack potentially compromised sensitive client information, posing significant risks to the firm's operations and reputation.

BianLian Ransomware Group

BianLian has rapidly evolved since its emergence in 2022, distinguishing itself through its adaptability and diverse attack methodologies. Initially known for a double-extortion model, the group has shifted to a pure data exfiltration approach, focusing on stealing data and threatening to release it unless ransoms are paid. This strategy has proven effective, particularly against sectors like finance, healthcare, and legal services.

Penetration Tactics

The BianLian group typically gains initial access through compromised Remote Desktop Protocol (RDP) credentials, phishing, or exploiting known vulnerabilities. Once inside, they employ custom backdoors to maintain control over the compromised systems. In MQB's case, the exact method of penetration remains undisclosed, but the firm's reliance on digital systems for financial data management likely presented an opportunity for exploitation.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.