Ransomware Attack on Cushman Contracting Corporation by 8Base

Incident Date: May 13, 2024

Attack Overview
VICTIM
Cushman Contracting Corporation
INDUSTRY
Construction
LOCATION
USA
ATTACKER
8base
FIRST REPORTED
May 13, 2024

Ransomware Attack on Cushman Contracting Corporation by 8Base

Victim Overview

Cushman Contracting Corporation, a general engineering contractor based in Santa Barbara, California, with over 50 years of experience, fell victim to a cyberattack orchestrated by the ransomware group 8Base. The company has a diverse client base, including federal, state, county, city, special district, and private entities. They specialize in commercial and residential construction projects, offering services such as general contracting, construction management, design-build services, and renovation project, generating a company revenue of $9.5 million.

Standout in the Industry

The corporation is known for its quality work and ability to deliver projects under budget. The company has received positive reviews from clients such as the Carpinteria Sanitary District, Ventura Harbor Boatyard, and Mammoth Community Water District.

Victim Vulnerabilities

The company's vulnerabilities in being targeted by threat actors include the exposure of sensitive information such as invoices, receipts, accounting documents, personal data, certificates, employment contracts, and more. The leaked data, fully published by the attackers, indicates a significant breach of security.

Attack Overview

The cybercrime group 8Base utilized ransomware as their attack method to compromise Cushman Contracting Corporation's website. The attack led to the exposure of various types of confidential data, highlighting the critical importance of implementing robust cybersecurity measures to mitigate such threats.

Ransomware Group 8Base

The 8Base ransomware group has gained notoriety for its aggressive tactics, primarily targeting small and medium-sized businesses across various sectors. They are known for their double-extortion tactics, where they encrypt a victim's files and threaten to publicly release stolen data if the ransom is not paid. The group uses ransomware strains like Phobos and spreads via phishing emails, exploit kits, and drive-by downloads.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.