Lennartsfors AB Hit by Meow Ransomware: 17 GB of Sensitive Data Compromised

Incident Date: Aug 16, 2024

Attack Overview
VICTIM
Lennartsfors AB
INDUSTRY
Manufacturing
LOCATION
Sweden
ATTACKER
Meow
FIRST REPORTED
August 16, 2024

Ransomware Attack on Lennartsfors AB by Meow Ransomware Group

Lennartsfors AB, a Swedish company renowned for its innovative forestry and agricultural equipment, has fallen victim to a ransomware attack orchestrated by the Meow ransomware group. The attack has compromised 17 GB of sensitive data, including employee information, client details, financial records, and technical drawings.

About Lennartsfors AB

Founded in 1948 and located in Värmland County, Sweden, Lennartsfors AB specializes in the development, manufacturing, and distribution of niche vehicles and machines designed for both off-road and on-road applications. The company is particularly known for its "Järnhästen" (Iron Horse) product line, which has been a staple since the 1980s. With approximately 7 employees and an annual revenue of around $4 million, Lennartsfors AB is a small but significant player in the motor vehicle manufacturing industry. Their products are highly valued for their versatility, making them suitable for a range of applications, including forestry, landscaping, and fire-fighting.

Attack Overview

The Meow ransomware group claims to have infiltrated Lennartsfors AB's systems, exfiltrating 17 GB of sensitive data. The compromised information includes employee data, client information, scanned payment documents, financial records, technical drawings, product development details, and other confidential materials. The attack has been publicized on the group's dark web leak site, putting the company's sensitive information at risk of being exposed if the ransom is not paid.

About Meow Ransomware Group

Meow Ransomware emerged in late 2022 and has been associated with the Conti v2 ransomware variant. The group resurfaced in late 2023 and has been highly active in 2024, primarily targeting organizations in the United States. Meow Ransomware employs various infection methods, including phishing emails, exploit kits, Remote Desktop Protocol (RDP) vulnerabilities, and malvertising. Once a system is compromised, the ransomware encrypts files using a combination of the ChaCha20 and RSA-4096 algorithms. The group is known for its aggressive tactics, including posting victim data on their leak site if the ransom is not paid.

Potential Vulnerabilities

Lennartsfors AB, like many small to medium-sized enterprises, may have been vulnerable due to limited cybersecurity resources and outdated security protocols. The company's focus on niche manufacturing and specialized equipment could have made it an attractive target for ransomware groups seeking to exploit sensitive technical and financial data. The use of RDP vulnerabilities and phishing emails are common attack vectors that could have been employed by the Meow ransomware group to penetrate Lennartsfors AB's systems.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.