Maxus Group Faces Ransomware Breach by Akira Group

Incident Date: Nov 18, 2024

Attack Overview
VICTIM
Maxus Group
INDUSTRY
Construction
LOCATION
USA
ATTACKER
Akira
FIRST REPORTED
November 18, 2024

Ransomware Attack on Maxus Group: A Detailed Analysis

Maxus Group, a New York-based specialty contractor and supplier, recently fell victim to a ransomware attack orchestrated by the Akira group. Known for its expertise in design and engineering, electronic security, and project management, Maxus Group serves diverse sectors, including commercial, healthcare, and infrastructure. With a workforce ranging from 35 to 200 employees and an annual revenue of $13.7 million, the company is a significant player in the construction and technology sectors.

Attack Overview

The ransomware attack on Maxus Group resulted in the compromise of sensitive client information. The attackers accessed contractor details, including non-disclosure agreements, social security numbers, and contact information. Additionally, credit card screens with CVV codes and internal financial documents were exposed. The Akira group facilitated the data breach by providing a torrent file, allowing easy access to the stolen data through popular torrent clients without password protection.

About Akira Ransomware Group

Emerging in March 2023, Akira operates as a Ransomware-as-a-Service (RaaS) entity, employing a double extortion model. The group is known for its sophisticated encryption techniques and potential ties to the former Conti group. Akira targets sectors with high-stakes data, including healthcare, finance, and manufacturing, using advanced tools and strategies. The group’s recent development of a Rust-based Linux variant for VMware ESXi environments highlights its cross-platform targeting capabilities.

Penetration and Vulnerabilities

Akira's penetration into Maxus Group's systems likely involved exploiting vulnerabilities in VPN credentials or unpatched software. The group is adept at bypassing multi-factor authentication and employs spear-phishing tactics to gain initial access. Maxus Group's involvement in high-value sectors and reliance on digital tools for project management may have made it an attractive target for Akira, which prioritizes organizations with significant operational dependencies and sensitive data.

Implications for Maxus Group

The attack underscores the vulnerabilities faced by companies in the construction and technology sectors, particularly those integrating advanced digital solutions. Maxus Group's commitment to leveraging technology for improved project management, as evidenced by its recent partnership with Procore, may have inadvertently increased its exposure to cyber threats. The breach highlights the need for effective cybersecurity measures to protect sensitive client information and maintain operational integrity.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.