CertiCon Hit by DragonForce Ransomware: 40GB Data Stolen

Incident Date: Jul 25, 2024

Attack Overview
VICTIM
CertiCon
INDUSTRY
Telecommunications
LOCATION
Czech Republic
ATTACKER
Dragonforce
FIRST REPORTED
July 25, 2024

DragonForce Ransomware Group Claims Attack on CertiCon

Overview of the Attack

CertiCon, a prominent Czech technology company, has fallen victim to a ransomware attack orchestrated by the DragonForce group. The cybercriminals claim to have exfiltrated 40.37 GB of sensitive data from CertiCon's systems. The attackers have set a ransom deadline for August 1, 2024, demanding payment to prevent the release or further exploitation of the stolen data. This incident underscores the growing threat of ransomware attacks and the critical need for robust cybersecurity measures.

About CertiCon

Founded in 1996 and headquartered in Prague, CertiCon has evolved into a significant player in the technology sector, providing innovative IT and hardware solutions across various industries, including telecommunications, healthcare, industrial production, and security. The company operates in over 30 countries, including the USA, Canada, and Japan. CertiCon is known for its applied research and collaboration with numerous research institutions, enhancing its capability to deliver advanced technological solutions.

Core Services and Innovations

CertiCon specializes in software development, hardware design, testing, and prototyping, delivering custom solutions tailored to the specific needs of its clients. Notable innovations include CertiConVis, a comprehensive video analytics solution utilizing artificial intelligence for security and business applications. The company holds several international certifications, including ISO 9001, ISO 13485, ISO 14001, and ISO 45001, reflecting its commitment to quality and compliance.

Vulnerabilities and Targeting

Despite its robust reputation, CertiCon's extensive operations and valuable data make it an attractive target for ransomware groups like DragonForce. The company's involvement in critical sectors such as telecommunications and healthcare likely increases its vulnerability, as these industries often hold sensitive and high-value information. The attack on CertiCon highlights the importance of continuous vigilance and advanced cybersecurity measures to protect against sophisticated cyber threats.

About DragonForce Ransomware Group

DragonForce is a relatively new ransomware group that emerged in late 2023. They are known for using double extortion tactics, encrypting victims' data and exfiltrating sensitive information, which they threaten to release publicly if the ransom is not paid. DragonForce has claimed attacks against various high-profile victims across multiple countries. Their ransomware code is based on a leaked builder from the infamous LockBit ransomware group, suggesting a rapid development and deployment strategy.

Penetration Methods

While specific details of how DragonForce penetrated CertiCon's systems are not disclosed, it is likely that the group leveraged common vulnerabilities such as phishing attacks, unpatched software, or weak network security protocols. The use of sophisticated malware and double extortion tactics further complicates the defense against such attacks, emphasizing the need for comprehensive cybersecurity strategies.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.