Ransomware Attack on Hauschild by 8Base Highlights Sector Risks

Incident Date: Oct 09, 2024

Attack Overview
VICTIM
Hauschild Installationen
INDUSTRY
Construction
LOCATION
Austria
ATTACKER
8base
FIRST REPORTED
October 9, 2024

Ransomware Attack on Hauschild Installationen by 8Base Group

Hauschild Installationen GmbH & Co KG, a prominent Austrian company specializing in building technology and bathroom architecture, has recently fallen victim to a ransomware attack orchestrated by the notorious 8Base group. This attack highlights the vulnerabilities faced by companies in the construction sector, particularly those with a strong regional presence and a diverse service portfolio.

Company Profile and Industry Standing

Established in 1969, Hauschild Installationen has built a solid reputation in the Kitzbühel and Pinzgau regions of Austria. The company offers a comprehensive range of services, including the planning and installation of gas, water, and heating systems, as well as swimming pools and modern bathrooms. Their clientele spans residential and commercial sectors, including hotels, restaurants, and public institutions. With a workforce of 51 to 200 employees, Hauschild is known for its commitment to quality and customer satisfaction, emphasizing ongoing staff training and sustainable practices.

Details of the Ransomware Attack

The 8Base ransomware group, known for its aggressive double-extortion tactics, claimed responsibility for the attack on Hauschild Installationen. The breach compromised sensitive information, including invoices, receipts, accounting documents, personal data, and confidential agreements. This incident is part of a broader campaign by 8Base, targeting 13 companies across various industries and countries. Despite the ransom deadline passing on September 30th, the data has not been released, leaving the status of negotiations uncertain.

About the 8Base Ransomware Group

Emerging in April 2022, the 8Base group has evolved into a sophisticated ransomware operation, employing AES-256 encryption and leveraging the Phobos ransomware variant. Their attacks typically begin with phishing emails or through compromised credentials sold on the Dark Web. The group distinguishes itself through its double-extortion strategy, encrypting and exfiltrating data to inflict financial and reputational damage on victims. Their communication style mimics legitimate penetration testing firms, adding a layer of pressure on victims to comply with ransom demands.

Potential Vulnerabilities and Penetration Methods

Hauschild Installationen's extensive digital footprint and diverse service offerings may have made it an attractive target for the 8Base group. The company's reliance on digital systems for managing client data and operational logistics could have provided multiple entry points for the attackers. The use of phishing emails or compromised credentials likely facilitated the initial breach, underscoring the importance of effective cybersecurity measures in protecting sensitive information.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.