Attack Overview
VICTIM
Eclipse
INDUSTRY
Business Services
LOCATION
Czech Republic
ATTACKER
Lockbit
FIRST REPORTED
July 25, 2022

Eclipse Print AS Targeted by Lockbit 3.0 Ransomware Group

Eclipse Print AS, a prominent company in the merchandise holding floorstands and large format advertising sector, has recently fallen victim to the Lockbit 3.0 ransomware group. With over 25 years of operational experience, Eclipse Print AS stands out as a market leader in the Business Services sector, boasting production sites and sales offices across Europe. The company is renowned for its innovative approach, developing new solutions, technological procedures, and utilizing cutting-edge materials.

The official website of Eclipse Print AS offers insights into their comprehensive range of services, which includes initial planning, production, logistics, co-packing, and installation. The company prides itself on maintaining fairness towards its clients, suppliers, and employees.

Lockbit 3.0, the ransomware group behind this attack, is notorious for its wide range of targets, including sectors such as manufacturing, communications, and healthcare. The group's modus operandi typically involves demanding ransoms paid in Bitcoin, with the amounts ranging from $1 million to $11 million. Phishing emails are often the starting point of their attacks.

As of now, Eclipse Print AS has not issued a public statement regarding the ransomware attack. The status of the ransom—whether it has been paid or if any data has been leaked—remains uncertain. Despite this, the company's website is still operational, showing no signs of the breach.

The Lockbit 3.0 group's history of attacks on critical infrastructure is well-documented, with their operations frequently beginning with phishing emails. They have also threatened to release stolen data from entities such as the city of Dallas unless a ransom is met.

It is crucial for Eclipse Print AS to take immediate steps to mitigate the impact of this ransomware attack. Recommended actions include isolating affected systems, restoring data from backups, and seeking the expertise of cybersecurity professionals to aid in the recovery process. Additionally, the company should inform affected parties and offer resources for identity monitoring and protection.

This analysis is based on information available at the time of writing and will be updated as new details emerge.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.