Ransomware Attack on Brovedani Group by 8Base
Ransomware Attack on Brovedani Group by 8Base
Victim Overview
A global company specializing in precision mechanical components and special machinery for process automation, Brovedani Group, was targeted by a cyberattack orchestrated by the cybercrime group 8Base. The company operates in the Manufacturing sector and offers integrated logistics and supply chain solutions for industries such as automotive, industrial, and consumer goods.
Company Profile
Brovedani Group is a global company with over 900 employees working across multiple locations, including Italy, Slovakia, and Mexico. The company emphasizes teamwork, continuous improvement, and innovation to create value for its clients and the market. Their revenue forecast for 2024 is €107.5 million, showcasing consistent growth over the years. The company stands out for its commitment to teamwork, continuous improvement, and innovation. The company values creating a safe and healthy work environment, as well as personal growth and development for its employees.
Company Vulnerabilities
Being a global company with a diverse workforce and operating in the Manufacturing sector, Brovedani Group may have been targeted by threat actors due to the sensitive nature of the data they handle, including invoices, receipts, accounting documents, personal data, certificates, employment contracts, and more. The exposure of such confidential information can have severe repercussions for the company's brand and reputation.
Attack Overview
The cyberattack on Brovedani Group involved the deployment of ransomware by the 8Base group, resulting in the compromise of the victim's website. The attack led to the exposure of various types of sensitive data, which were fully published, indicating a significant breach of security.
Ransomware Group 8Base
The 8Base ransomware group has gained notoriety for its aggressive tactics, primarily targeting small and medium-sized businesses across sectors like manufacturing. They are known for their double-extortion tactics, where they encrypt files and steal data to pressure victims into paying the ransom. The group has been active since April 2022 and uses ransomware strains like Phobos, customized with a ".8base" extension.
Sources
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!