Micon Office National Hit by Sarcoma Ransomware Attack

Incident Date: Nov 14, 2024

Attack Overview
VICTIM
Micon Office National
INDUSTRY
Insurance
LOCATION
Australia
ATTACKER
Sarcoma
FIRST REPORTED
November 14, 2024

Ransomware Attack on Micon Office National by Sarcoma Group

Micon Office National, a family-owned business based in Australia, has recently fallen victim to a ransomware attack orchestrated by the Sarcoma group. Specializing in office supplies and furniture, Micon has established a strong presence in the Illawarra and Wollongong regions, extending its services to Nowra, Shoalhaven, Bowral, Mittagong, and the Sydney Metropolitan area. The company is known for its extensive product range and personalized customer service, operating as an independent dealer within the Office National buying group.

Company Profile and Vulnerabilities

With over 15 years in the industry, Micon Office National has built a reputation for providing tailored office solutions, leveraging its affiliation with the Office National buying group to offer competitive pricing. Despite its strengths, the company's digital infrastructure has proven vulnerable to cyber threats, as evidenced by the recent ransomware attack. The Sarcoma group claims to have exfiltrated 34 GB of sensitive data, including SQL databases and Exchange server information, although Micon has publicly denied any data exfiltration.

Attack Overview

The Sarcoma ransomware group, known for its aggressive tactics, has targeted Micon Office National, asserting that they will release the stolen data within 10 to 11 days. This attack highlights the growing threat of ransomware to businesses, particularly those with significant digital operations. The breach suggests a substantial compromise of Micon's digital infrastructure, raising concerns about the security measures in place to protect sensitive information.

Sarcoma Ransomware Group

Sarcoma has quickly established itself as a formidable player in the cybercrime landscape, particularly targeting companies in Australia and New Zealand. The group employs a double extortion model, encrypting data and threatening to leak it if ransoms are not paid. Sarcoma's tactics include targeting supply chains and using strong encryption methods, making it challenging for victims to recover data without complying with ransom demands. The group's ability to penetrate Micon's systems may have involved exploiting vulnerabilities in network security or leveraging compromised vendor access.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.