LockBit 3.0 Strikes gammaRenax AG: A Cybersecurity Threat to a Multinational Company

Incident Date: May 07, 2024

Attack Overview
VICTIM
gammaRenax AG
INDUSTRY
Business Services
LOCATION
Switzerland
ATTACKER
Lockbit
FIRST REPORTED
May 7, 2024

Ransomware Attack on gammaRenax AG by LockBit 3.0

Victim Profile

GammaRenax AG is a company specializing in facility services, offering a broad range of services such as general cleaning, building services, garden maintenance, and administration. The company prides itself on a multicultural and multifaceted working environment, employing staff from around 63 countries of origin. They emphasize fair working conditions, correct remuneration, targeted training, and compliance with labor laws, safety, and health requirements.

Company Standout

The Swiss company stands out for its commitment to professional advancement, particularly focusing on training apprentices in various fields such as commercial clerks, building cleaners, and maintenance specialists. They offer recognized apprenticeships with practical training, highlighting a dedication to nurturing young talent and providing them with a solid foundation for their future careers.

Company Size

The attacked company has over 1800 employees, showcasing its substantial workforce and operational scale. It has grown significantly since its establishment in 1985 and remains family-owned, now in its second generation of leadership.

Ransomware Attack Details

Recently, Gammarenax was the target of a cyberattack by the LockBit 3.0 ransomware group. LockBit 3.0, also known as LockBit Black, is a new variant of the LockBit ransomware that emerged in 2022. It is considered one of the most dangerous and disruptive ransomware threats currently active.

Vulnerabilities

Being a company with a substantial workforce and a focus on customer satisfaction, Gammarenax may have been targeted by threat actors due to the sensitive nature of the data they handle. The company's commitment to quality and customer satisfaction, as well as its certifications in various management systems, could have made it an attractive target for cybercriminals seeking to disrupt operations and extort ransom payments.

LockBit May Attacks:

This is part of the May 2024 attacks by LockBit3.0, a cybercriminal group, resurfaced with vigor following the disruption of its infrastructure during "Operation Cronos," a collaborative effort by international law enforcement agencies. Despite arrests and the dismantling of its data leak site, LockBit swiftly returned, targeting over 50 victims within hours of reactivating its platform, with subsequent attacks adding to the tally. These assaults spanned various sectors and countries, showcasing LockBit's global reach and adaptability.

Sources:

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.