Qilin Ransomware Strikes Above All Store Fronts

Incident Date: Jun 08, 2024

Attack Overview
VICTIM
Above All Store Fronts
INDUSTRY
Construction
LOCATION
USA
ATTACKER
Qilin
FIRST REPORTED
June 8, 2024

Qilin Ransomware Group Targets Above All Store Fronts

Overview of the Attack

The Qilin ransomware group, also known as Agenda, has claimed responsibility for a significant ransomware attack on Above All Store Fronts, a leading architectural glazing and cladding service provider in the greater New York area. The breach, discovered on June 4, 2024, resulted in a data leak of 1.7TB, severely impacting the company's operations.

About Above All Store Fronts

Above All Store Fronts, Inc. is a family-owned business established in 1993, specializing in the design, fabrication, and installation of commercial storefronts and architectural glass systems. The company employs over 200 skilled professionals and has built a strong reputation in the construction sector, particularly in the tri-state area. Their comprehensive services, from initial consultation to final installation, cater to a variety of commercial projects, including retail spaces and office buildings.

Vulnerabilities and Impact

Despite their industry standing, Above All Store Fronts' extensive use of advanced technology and high-quality materials may have made them an attractive target for cybercriminals. The company's reliance on digital systems for project management and client interactions could have exposed vulnerabilities that the Qilin group exploited. The attack not only jeopardizes sensitive client data but also threatens the company's reputation and operational continuity.

Profile of the Qilin Ransomware Group

The Qilin ransomware group is a prominent ransomware-as-a-service (RaaS) entity that emerged in 2022. Known for targeting critical infrastructure and other essential services, Qilin customizes its attacks for each victim, complicating recovery efforts. The ransomware, written in Rust and Go, employs double extortion techniques, exfiltrating sensitive data and demanding ransom for decryption while threatening to release the stolen data.

The ransomware typically infiltrates systems through phishing emails containing malicious links, followed by lateral movement across the victim's infrastructure to locate and encrypt essential data. The group's sophisticated approach and high payout rates to affiliates make it a formidable threat in the cybersecurity landscape.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.