Qilin Ransomware Strikes Diamond Contracting in Cyber Attack

Incident Date: Sep 23, 2024

Attack Overview
VICTIM
DIamond Contracting, LLC
INDUSTRY
Construction
LOCATION
USA
ATTACKER
Qilin
FIRST REPORTED
September 23, 2024

Qilin Ransomware Group Targets Diamond Contracting LLC

Diamond Contracting LLC, a respected construction company based in Peoria, Arizona, has recently been targeted by a ransomware attack orchestrated by the infamous Qilin group. Known for its extensive range of construction services, Diamond Contracting excels in remodeling, home improvements, and roofing, serving both residential and commercial clients. With over 40 years of combined experience, the company has earned a reputation for quality workmanship and exceptional service.

Company Profile and Vulnerabilities

As a small business, Diamond Contracting has been actively involved in approximately 37 projects over the past year. Despite its size, the company has built a strong reputation, evidenced by its accreditation with the Better Business Bureau and a perfect customer review rating. However, like many small businesses, Diamond Contracting may lack the advanced cybersecurity infrastructure necessary to fend off sophisticated cyber threats, making it a potential target for ransomware groups like Qilin.

Attack Overview

The Qilin ransomware group, operating under a Ransomware-as-a-Service model, has claimed responsibility for the attack on Diamond Contracting. The group is notorious for its double extortion strategy, which involves encrypting the victim's data and exfiltrating sensitive information. This tactic is designed to pressure victims into paying the ransom by threatening to release stolen data publicly. The specifics of the data compromised in this attack have not been disclosed, but the breach highlights the vulnerabilities faced by small businesses in the construction sector.

Qilin Ransomware Group

Qilin, also known as Agenda, has gained notoriety for its sophisticated cyber attacks since its emergence in 2022. The group distinguishes itself by using Rust-based malware, enhancing its evasion capabilities and allowing for attacks across multiple operating systems. Qilin's operations have targeted over 150 organizations in 25 countries, with a focus on sectors such as healthcare, education, and now construction. The group's ability to adapt quickly and effectively target vulnerable organizations makes it a significant threat in the cybersecurity landscape.

Potential Penetration Methods

While the exact method of penetration in the Diamond Contracting attack is not publicly known, Qilin typically gains initial access through phishing emails containing malicious links. Once inside the network, the group exploits vulnerabilities to escalate privileges and exfiltrate data before encryption. This multi-faceted approach allows Qilin to maximize disruption and increase the likelihood of ransom payment.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.