lockbit2 attacks Topaces

Incident Date: May 10, 2022

Attack Overview
VICTIM
Topaces
INDUSTRY
Government
LOCATION
Canada
ATTACKER
Lockbit
FIRST REPORTED
May 10, 2022

Analysis of the Ransomware Attack on Top Aces

Overview of Top Aces

Top Aces, a premier provider of advanced adversary air (ADAIR) and joint terminal attack controller (JTAC) technology and training, serves the world's elite armed forces. The company specializes in mission-critical training that bolsters the operational readiness of combat forces, offering cost-effective solutions and prolonging the service life of military aircraft fleets. Its services feature 4th Generation maneuverability, a wide range of air-to-air weapons and sensors, all-weather capabilities, and aircraft that are light weight and capable of withstanding 9 Gs. Training programs cover JTAC, adversary support, anti-shipping attack training, and electronic warfare.

Founded in 2000 by a cadre of former fighter pilots, Top Aces boasts the "largest worldwide footprint of privately-held operational fighter aircraft," serving the Canadian, German, Israeli, and U.S. armed forces. Despite its prominence in the defense sector, specific details regarding the company's size remain undisclosed.

The Lockbit2 Ransomware Attack

The ransomware group Lockbit2 has targeted Top Aces, marking a significant cybersecurity incident within the Government sector. Top Aces has acknowledged the attack and is in the process of conducting a thorough investigation.

Lockbit2, known for its aggressive ransomware campaigns, has claimed responsibility for compromising hundreds of organizations in the past year alone, targeting at least 650 entities to date. The group has threatened to release 44GB of data stolen from Top Aces unless their demands are met by May 15. The specific vulnerabilities exploited in the attack on Top Aces have not been disclosed.

This incident underscores the persistent threat posed by ransomware groups like Lockbit2 to critical defense infrastructure and the importance of robust cybersecurity measures to protect sensitive data and maintain operational readiness.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.