lockbit2 attacks cyberapex

Incident Date: Apr 14, 2022

Attack Overview
VICTIM
cyberapex
INDUSTRY
Business Services
LOCATION
Hong Kong
ATTACKER
Lockbit
FIRST REPORTED
April 14, 2022

CyberApex Technology Limited Targeted by Play Ransomware Group

Overview of the Attack

CyberApex Technology Limited, a Hong Kong-based company within the Business Services sector, has recently fallen victim to the Play Ransomware group. This incident was disclosed on a dark web leak site, highlighting the company's vulnerability. The Play Ransomware group, also identified as Playcrypt, has been operational since June 2022, targeting around 300 entities across various continents including North America, South America, and Europe.

Company Profile and Vulnerabilities

Despite being a relatively small entity, CyberApex Technology Limited's insufficient cybersecurity measures made it a prime target for the Play Ransomware group. The lack of detailed information on the company's website about its size or the services it offers suggests a potential underestimation of cybersecurity threats. The breach could have been facilitated by exploiting known vulnerabilities or through inadequate security practices such as unpatched systems or the use of weak passwords.

Play Ransomware Group Tactics

The Play Ransomware group employs sophisticated evasion techniques to circumvent detection by conventional security tools. This underscores the necessity for organizations to integrate Comprehensive Threat Intelligence (CTI) platforms for early detection of emerging threats from the dark web. The group's modus operandi includes leveraging valid accounts, exploiting exposed Remote Desktop Protocol (RDP) servers, and utilizing FortiOS vulnerabilities for initial access. Subsequent to gaining entry, they deploy tools like AdFind to extract information from Active Directory and disseminate malicious executables across the network through Group Policy Objects, scheduled tasks, or PsExec.

Recommended Mitigation Strategies

To counter the threat of ransomware attacks, it is imperative for organizations to implement multifactor authentication, adhere to the principle of least privilege, and ensure both logical and physical network segmentation. Additional measures include attack surface management, securing domain controllers, maintaining offline and encrypted backups, and diligently tracking security patches along with software and operating system updates. Leveraging Dark Web News modules for the latest intelligence can also equip organizations with the knowledge to preempt potential cyber threats.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.