Dumont Printing Hit by Akira Ransomware Exposing Data

Incident Date: Nov 13, 2024

Attack Overview
VICTIM
Dumont Printing
INDUSTRY
Finance
LOCATION
USA
ATTACKER
Akira
FIRST REPORTED
November 13, 2024

Ransomware Attack on Dumont Printing by Akira Group

On November 14, Dumont Printing, a leading commercial printing company based in Fresno, California, became the latest victim of a ransomware attack by the notorious Akira group. This incident has raised significant concerns about data security and operational integrity within the company.

About Dumont Printing

Established in 1950, Dumont Printing has grown to become the largest full-service commercial printing company in California's Central Valley. Owned by Susan Moore, the company is recognized for its advanced printing technologies, including offset and digital printing, and its commitment to sustainability through initiatives like the "You Print, We Plant" program. With a workforce of 25 to 100 employees, Dumont Printing generates an estimated annual revenue of $9.1 million, underscoring its strong market presence.

Attack Overview

The ransomware attack orchestrated by Akira compromised sensitive data, including employee and customer contact information, Social Security Numbers, and driver licenses. The breach poses significant risks to the privacy and security of affected individuals. Dumont Printing's extensive service offerings, including graphic design, variable data printing, and fulfillment services, make it a valuable target for threat actors seeking to exploit high-value data.

About Akira Ransomware Group

Akira, a Ransomware-as-a-Service (RaaS) group, emerged in March 2023 and quickly established itself as a formidable player in the cyber threat landscape. Known for its double extortion model, Akira encrypts and threatens to expose sensitive data, demanding ransoms ranging from $200,000 to $4 million. The group is distinguished by its sophisticated encryption techniques and cross-platform capabilities, including a Rust-based variant for Linux and VMware ESXi environments.

Potential Vulnerabilities

Dumont Printing's reliance on advanced digital infrastructure and its handling of sensitive customer data may have made it susceptible to Akira's attack vectors. The group typically gains initial access through spear-phishing, exploiting compromised VPN credentials, and targeting unpatched vulnerabilities. These methods allow Akira to bypass security measures and maintain persistent access within victim networks.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.