Intercomp Hit by Akira Ransomware Exposing Data Vulnerabilities

Incident Date: Nov 13, 2024

Attack Overview
VICTIM
Intercomp Company
INDUSTRY
Energy, Utilities & Waste
LOCATION
USA
ATTACKER
Akira
FIRST REPORTED
November 13, 2024

Ransomware Attack on Intercomp Company by Akira Group

Intercomp Company, a prominent player in the Electrical & Electronic Manufacturing sector, has recently fallen victim to a ransomware attack orchestrated by the notorious Akira group. This incident underscores the vulnerabilities faced by industry leaders in the face of sophisticated cyber threats.

About Intercomp Company

Intercomp Company, established in 1971, is renowned for its advanced weighing and measurement solutions, particularly in the transportation and industrial sectors. With a workforce of approximately 85 employees, the company has built a strong reputation for its innovative products, including Weigh-In-Motion (WIM) systems and static weighing solutions. Intercomp's commitment to quality is highlighted by its ISO 9001:2015 certification and its status as one of the few manufacturers worldwide to achieve OIML certification for high-speed WIM. The company's products are integral to ensuring compliance with regulatory standards and enhancing operational efficiency across various sectors.

Details of the Attack

The Akira ransomware group has claimed responsibility for infiltrating Intercomp's systems, compromising sensitive data such as internal corporate correspondence, customer and employee contact details, and proprietary corporate information. The attackers have threatened to release this data, posing significant risks to Intercomp's operations and reputation. This breach highlights the potential vulnerabilities in Intercomp's cybersecurity infrastructure, making it a target for sophisticated threat actors.

Profile of the Akira Ransomware Group

Emerging in March 2023, Akira operates as a Ransomware-as-a-Service (RaaS) entity, employing a double extortion model. The group is known for its technical sophistication and potential connections with the former Conti group. Akira targets sectors with high-stakes data, including manufacturing, healthcare, and finance, using advanced encryption techniques and cross-platform capabilities. The group's recent development of a Rust-based Linux variant for VMware ESXi environments demonstrates its commitment to expanding its operational reach.

Potential Vulnerabilities and Attack Vectors

Akira's penetration into Intercomp's systems may have been facilitated through compromised VPN credentials, spear-phishing attacks, or exploitation of unpatched vulnerabilities in network infrastructure. The group's ability to bypass multi-factor authentication and disable security measures further underscores the need for enhanced cybersecurity defenses. Intercomp's reliance on intricate technological frameworks may have made it an attractive target for Akira's calculated and high-impact strategies.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.