Jillamy Hit by Fog Ransomware Exposing 28GB of Sensitive Data

Incident Date: Oct 30, 2024

Attack Overview
VICTIM
Jillamy
INDUSTRY
Transportation
LOCATION
USA
ATTACKER
Fog
FIRST REPORTED
October 30, 2024

Jillamy Targeted by Fog Ransomware: A Deep Dive into the Attack

Jillamy, a logistics and supply chain management company based in Chalfont, Pennsylvania, has recently fallen victim to a ransomware attack orchestrated by the notorious Fog ransomware group. This incident highlights the vulnerabilities faced by mid-sized companies in the transportation sector, particularly those with significant digital operations.

Company Profile and Industry Standing

Founded in 2002, Jillamy specializes in third-party logistics (3PL), offering a comprehensive suite of services including transportation, warehousing, fulfillment, and packaging solutions. With an estimated annual revenue of $50.7 million and a workforce of 100 to 250 employees, Jillamy is a significant player in the logistics industry. Their asset-based 3PL services and commitment to sustainability distinguish them in a competitive market. However, their reliance on digital infrastructure for managing complex supply chains makes them a prime target for cyber threats.

Details of the Ransomware Attack

The Fog ransomware group claims to have exfiltrated 28 GB of sensitive data from Jillamy, including customer contacts, internal financial data, employee contacts, and a sublease agreement. This breach of confidential information poses a substantial risk to Jillamy, potentially leading to financial losses and reputational damage. The attackers have reportedly used sophisticated techniques to infiltrate Jillamy's systems, likely exploiting vulnerabilities in their network security.

Fog Ransomware Group: A Growing Threat

Fog ransomware, a variant of the STOP/DJVU family, has been active since November 2021. Known for its rapid encryption capabilities and double extortion tactics, the group has targeted various sectors, including education, healthcare, and finance. The ransomware typically encrypts files with extensions like .fog or .flocked and demands a ransom in Bitcoin. Fog's ability to exploit compromised VPN credentials and known application vulnerabilities makes it a formidable adversary for companies like Jillamy.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.