Ransomware Attack on ACLA GmbH by LockBit 3.0

Incident Date: May 16, 2024

Attack Overview
VICTIM
ACLA GmbH
INDUSTRY
Manufacturing
LOCATION
Germany
ATTACKER
Lockbit
FIRST REPORTED
May 16, 2024

Ransomware Attack on ACLA GmbH by LockBit 3.0

Victim Overview

ACLA-WERKE GmbH, a German company specializing in manufacturing technical polyurethane elastomer products for the transport and materials handling sectors, fell victim to a cybercrime attack by LockBit 3.0. The company's website was targeted in this ransomware attack. The company operates in the manufacturing industry with a workforce of 16 employees. The company's annual revenue is approximately €29.3 million. A standout feature of the company is its extensive expertise in processing high-grade PUR-elastomers, boasting over 50 years of experience in this field.

Attack Overview

The attacker used ransomware to encrypt ACLA's data, likely aiming to extort a ransom from the victim for the decryption of their information. This attack poses a significant threat to the company's operations and data security.

Ransomware Group Details

LockBit 3.0, also known as LockBit Black, is a Ransomware-as-a-Service (RaaS) group that has evolved from previous versions of LockBit. It is considered one of the most dangerous and disruptive ransomware threats currently active, with advanced features and capabilities.

Attack Vector

LockBit 3.0 is known for encrypting files, modifying filenames, changing desktop wallpapers, and dropping ransom notes on victims' desktops. The ransomware is heavily obfuscated and protected against analysis, making it challenging for security researchers to study. It can move laterally through a network via group policy updates and delete traces of itself to cover its tracks.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.