Monti Ransomware Hits Seng Tsoi Architect in Major Data Breach

Incident Date: Aug 30, 2024

Attack Overview
VICTIM
Seng Tsoi Architect
INDUSTRY
Construction
LOCATION
Canada
ATTACKER
Monti
FIRST REPORTED
August 30, 2024

Monti Ransomware Group Targets Seng Tsoi Architect in Significant Data Breach

Seng Tsoi Architect, a Vancouver-based architectural firm, has recently fallen victim to a ransomware attack orchestrated by the Monti group. This incident has resulted in the compromise of sensitive information, posing severe risks to the firm's operations and reputation.

About Seng Tsoi Architect

Founded in 2016 by Seng Tsoi, STA Office Architecture Inc. specializes in contemporary architectural design and consulting services. The firm is known for its innovative approach, integrating landscape and built forms to create cohesive and sustainable environments. With a team of approximately six employees, STA Office focuses on residential, commercial, and public space projects, emphasizing cultural and ecological considerations in their designs.

Vulnerabilities and Targeting

Despite its small size, STA Office handles a significant amount of sensitive client information, making it an attractive target for cybercriminals. The firm's commitment to innovative design and consulting services means it often collaborates with various partners, further increasing the risk of data breaches. The recent attack underscores the importance of stringent cybersecurity measures, particularly for firms in the architecture sector.

Attack Overview

The Monti ransomware group managed to infiltrate STA Office's systems, exfiltrating confidential data related to customers, employees, and contractual agreements. Additionally, information about the firm's partnerships with other companies was compromised. This breach highlights the severe risk to the privacy and security of all involved parties, with potential far-reaching implications for the firm's operations.

About Monti Ransomware Group

Monti ransomware emerged in June 2022, quickly gaining notoriety for its tactics that closely mirror those of the Conti group. The ransomware targets both Windows and Linux systems, with encrypted files typically bearing the ".puuuk" extension. Monti's ransom notes demand payment for decryption and threaten to leak sensitive data if the ransom is not paid. The group has shown adaptability by incorporating elements from previous ransomware variants and developing new techniques to evade detection.

Penetration Methods

Monti ransomware likely penetrated STA Office's systems through common entry points such as phishing emails or exploiting vulnerabilities in remote monitoring and maintenance tools. The group's use of the Action1 Remote Monitoring and Maintenance (RMM) agent, which was not previously associated with Conti attacks, indicates their evolving strategies to enhance effectiveness and evade detection.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.