Dumont Printing Hit by Akira Ransomware Exposing Data
Ransomware Attack on Dumont Printing by Akira Group
On November 14, Dumont Printing, a leading commercial printing company based in Fresno, California, became the latest victim of a ransomware attack by the notorious Akira group. This incident has raised significant concerns about data security and operational integrity within the company.
About Dumont Printing
Established in 1950, Dumont Printing has grown to become the largest full-service commercial printing company in California's Central Valley. Owned by Susan Moore, the company is recognized for its advanced printing technologies, including offset and digital printing, and its commitment to sustainability through initiatives like the "You Print, We Plant" program. With a workforce of 25 to 100 employees, Dumont Printing generates an estimated annual revenue of $9.1 million, underscoring its strong market presence.
Attack Overview
The ransomware attack orchestrated by Akira compromised sensitive data, including employee and customer contact information, Social Security Numbers, and driver licenses. The breach poses significant risks to the privacy and security of affected individuals. Dumont Printing's extensive service offerings, including graphic design, variable data printing, and fulfillment services, make it a valuable target for threat actors seeking to exploit high-value data.
About Akira Ransomware Group
Akira, a Ransomware-as-a-Service (RaaS) group, emerged in March 2023 and quickly established itself as a formidable player in the cyber threat landscape. Known for its double extortion model, Akira encrypts and threatens to expose sensitive data, demanding ransoms ranging from $200,000 to $4 million. The group is distinguished by its sophisticated encryption techniques and cross-platform capabilities, including a Rust-based variant for Linux and VMware ESXi environments.
Potential Vulnerabilities
Dumont Printing's reliance on advanced digital infrastructure and its handling of sensitive customer data may have made it susceptible to Akira's attack vectors. The group typically gains initial access through spear-phishing, exploiting compromised VPN credentials, and targeting unpatched vulnerabilities. These methods allow Akira to bypass security measures and maintain persistent access within victim networks.
Sources
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!