LockBit Ransomware Hits Ignitarium Raising Data Security Concerns

Incident Date: Sep 15, 2024

Attack Overview
VICTIM
Ignitarium
INDUSTRY
Software
LOCATION
India
ATTACKER
Lockbit
FIRST REPORTED
September 15, 2024

LockBit Ransomware Attack on Ignitarium

Ignitarium, a prominent product engineering services company specializing in semiconductor design, embedded systems, and software development, has fallen victim to a ransomware attack orchestrated by the notorious LockBit group. The attack was explicitly claimed by LockBit on their dark web leak site, raising concerns about the potential impact on Ignitarium's operations and data security.

About Ignitarium

Founded in 2012, Ignitarium Technology Solutions Pvt Ltd has established itself as a key player in the technology sector, particularly in India. The company operates globally with offices in India (Bengaluru, Chennai, and Kochi), the USA (San Jose and Austin), Japan, Canada, and Germany. Ignitarium employs approximately 267 individuals and is recognized for its innovative engineering solutions across various domains, including semiconductor design, AI, and wireless-enabled embedded systems.

Ignitarium's core competencies include semiconductor design, FPGA prototyping, and embedded software development. The company also excels in multimedia and artificial intelligence applications, providing comprehensive solutions for complex engineering challenges. Ignitarium's collaborative approach and commitment to fostering a high-trust and high-performance culture have earned it certification from the Great Place to Work® Institute.

Attack Overview

The LockBit ransomware group, known for its sophisticated encryption techniques and double extortion tactics, claimed responsibility for the attack on Ignitarium. While specific details about the method of infiltration and the extent of the data compromised have not been disclosed, LockBit's modus operandi typically involves exploiting vulnerabilities in Remote Desktop Protocol (RDP) services and unsecured network shares to spread quickly across a network.

LockBit employs a combination of RSA-2048 and AES-256 encryption algorithms to encrypt victims' files and demands ransom payments in Bitcoin. The group is known for exfiltrating sensitive data and threatening to release it publicly if the ransom is not paid. This attack on Ignitarium underscores the growing threat posed by ransomware groups to companies in the technology sector.

About LockBit

LockBit is a highly sophisticated ransomware-as-a-service (RaaS) group that has been active since September 2019. It has become the most active ransomware group, responsible for over one-third of all ransomware attacks in the latter half of 2022 and the first quarter of 2023. LockBit's modular ransomware encrypts its payload until execution to hinder malware analysis and detection, making it a formidable threat to organizations worldwide.

LockBit distinguishes itself through its use of double extortion tactics and its ability to spread rapidly across networks by exploiting vulnerabilities. The group also performs checks to avoid executing on computer systems with installed languages common to the Commonwealth of Independent States (CIS) region, indicating a strategic focus on targeting specific regions.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.