DragonForce Ransomware Breach Exposes Precision Walls Data

Incident Date: Dec 06, 2024

Attack Overview
VICTIM
Precision Walls
INDUSTRY
Construction
LOCATION
USA
ATTACKER
Dragonforce
FIRST REPORTED
December 6, 2024

DragonForce Ransomware Attack on Precision Walls: A Detailed Analysis

Precision Walls, Inc., a prominent specialty contractor in the construction sector, has allegedly been targeted by a ransomware attack attributed to the DragonForce group. This incident brings to light the vulnerabilities that companies in the construction industry face, especially those handling data related to critical infrastructure projects.

About Precision Walls

Founded in 1977 and based in Cary, North Carolina, Precision Walls ranks among the top ten wall and ceiling contractors in the United States. The company operates in North Carolina, South Carolina, Virginia, and Tennessee, with a workforce of approximately 522 employees. As a 100% employee-owned enterprise, Precision Walls fosters a culture of dedication and responsibility. The company is renowned for its expertise in commercial drywall, acoustical ceilings, and exterior insulation and finish systems. Over nearly five decades, it has built a reputation for quality and reliability, emphasizing strong customer relationships and safety.

Attack Overview

The DragonForce ransomware group claims to have extracted 455.08 GB of sensitive data from Precision Walls. Allegedly, this data includes project details concerning banks, hospitals, hotels, industrial facilities, government buildings, and high-profile clients such as Google and Berkeley data centers. The breach highlights potential vulnerabilities in critical infrastructure projects, posing significant risks to both the company and its clients. DragonForce has accused Precision Walls of not acknowledging the breach and its consequences.

About DragonForce Ransomware Group

Emerging in late 2023, DragonForce has quickly gained notoriety for its advanced attack techniques. Operating on a Ransomware-as-a-Service model, the group enables affiliates to tailor attacks using modified versions of existing ransomware tools. DragonForce employs a double extortion strategy, exfiltrating sensitive data before encrypting it. Known for utilizing tools like SystemBC and Mimikatz, the group enhances its operational capabilities. Its association with the LockBit ransomware family further distinguishes it in the cybercriminal landscape.

Potential Vulnerabilities

Precision Walls' significant involvement in critical infrastructure projects makes it an appealing target for ransomware groups like DragonForce. The company's dependence on digital systems for project management and client data storage may have been exploited by the attackers. The breach underscores the necessity for effective cybersecurity measures to safeguard sensitive information and maintain operational integrity.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.