J&J Network Engineering Hit by DragonForce Ransomware, 115GB Data Leaked

Incident Date: Aug 18, 2024

Attack Overview
VICTIM
J&J Network Engineering
INDUSTRY
Construction
LOCATION
Hong Kong
ATTACKER
Dragonforce
FIRST REPORTED
August 18, 2024

DragonForce Ransomware Group Targets J&J Network Engineering in Major Data Breach

J&J Network Engineering Co., Ltd, a prominent player in the building construction industry based in Hong Kong, has recently fallen victim to a ransomware attack orchestrated by the DragonForce group. The attack, discovered on August 19, resulted in a significant data leak of 115.67GB, severely impacting the company's operations and client data security.

About J&J Network Engineering

J&J Network Engineering specializes in providing comprehensive engineering solutions, focusing on the design, installation, and maintenance of various network systems. Established in 2004, the company has built a reputation for its expertise in Building Management Systems (BMS), Life Science Clean Room Controls, Staircase Pressurization & Smoke Extraction Systems, Public Transport Interchanges (PTI) Environment Control, and Air Quality Monitoring & Control. With a team of 11 to 50 employees, J&J Network Engineering is known for its customer-centric approach and quick response to client needs.

Attack Overview

The ransomware attack on J&J Network Engineering was claimed by DragonForce, a relatively new but aggressive ransomware group that emerged in late 2023. The group is known for its double extortion tactics, where they encrypt victims' data and exfiltrate sensitive information, threatening to release it publicly if the ransom is not paid. In this case, DragonForce leaked 115.67GB of data on their dark web leak site, significantly compromising J&J Network Engineering's operational integrity and client confidentiality.

DragonForce Ransomware Group

DragonForce has quickly gained notoriety for its sophisticated attack methods and high-profile targets. The group uses a ransomware code based on a leaked builder from the infamous LockBit ransomware group, allowing them to rapidly develop and deploy their malware. DragonForce has targeted various industries across the globe, including the US, UK, Australia, Singapore, and other countries. Their victims include notable entities such as the Ohio Lottery, Yakult Australia, and Coca-Cola Singapore.

Vulnerabilities and Penetration

J&J Network Engineering's reliance on cutting-edge technology from top-tier equipment manufacturers makes them a lucrative target for ransomware groups like DragonForce. The company's extensive portfolio and involvement in complex infrastructure projects mean that any disruption can have far-reaching consequences. While the exact method of penetration remains unclear, it is likely that DragonForce exploited vulnerabilities in the company's network systems or leveraged social engineering tactics to gain access.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.