lockbit3 attacks Eclipse
Eclipse Print AS Targeted by Lockbit 3.0 Ransomware Group
Eclipse Print AS, a prominent company in the merchandise holding floorstands and large format advertising sector, has recently fallen victim to the Lockbit 3.0 ransomware group. With over 25 years of operational experience, Eclipse Print AS stands out as a market leader in the Business Services sector, boasting production sites and sales offices across Europe. The company is renowned for its innovative approach, developing new solutions, technological procedures, and utilizing cutting-edge materials.
The official website of Eclipse Print AS offers insights into their comprehensive range of services, which includes initial planning, production, logistics, co-packing, and installation. The company prides itself on maintaining fairness towards its clients, suppliers, and employees.
Lockbit 3.0, the ransomware group behind this attack, is notorious for its wide range of targets, including sectors such as manufacturing, communications, and healthcare. The group's modus operandi typically involves demanding ransoms paid in Bitcoin, with the amounts ranging from $1 million to $11 million. Phishing emails are often the starting point of their attacks.
As of now, Eclipse Print AS has not issued a public statement regarding the ransomware attack. The status of the ransom—whether it has been paid or if any data has been leaked—remains uncertain. Despite this, the company's website is still operational, showing no signs of the breach.
The Lockbit 3.0 group's history of attacks on critical infrastructure is well-documented, with their operations frequently beginning with phishing emails. They have also threatened to release stolen data from entities such as the city of Dallas unless a ransom is met.
It is crucial for Eclipse Print AS to take immediate steps to mitigate the impact of this ransomware attack. Recommended actions include isolating affected systems, restoring data from backups, and seeking the expertise of cybersecurity professionals to aid in the recovery process. Additionally, the company should inform affected parties and offer resources for identity monitoring and protection.
This analysis is based on information available at the time of writing and will be updated as new details emerge.
Sources
- Eclipse Print AS Website: https://www.eclipse-print.com/
- Skender Construction Ransomware Attack: https://www.constructiondive.com/news/skender-ransomware-attack-chicago-maine/712844/
- Royal Ransomware Group Threatens Release of Dallas Data: https://www.dallasobserver.com/news/ransomware-attackers-threaten-release-of-dallas-data-16607203
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!