Ransomware Attack Targets Hughes Gill Cochrane Tinetti

Incident Date: Sep 24, 2024

Attack Overview
VICTIM
Hughes Gill Cochrane Tinetti
INDUSTRY
Law Firms & Legal Services
LOCATION
USA
ATTACKER
Cicada 3301
FIRST REPORTED
September 24, 2024

Ransomware Attack on Hughes Gill Cochrane Tinetti by Cicada 3301

Hughes Gill Cochrane Tinetti (HGCT), a law firm based in Walnut Creek, California, has fallen victim to a ransomware attack by the group Cicada 3301. Specializing in community association law, HGCT serves a wide range of clients, including homeowners associations and condominium projects across Northern California. The firm is known for its deep expertise and personalized service, making it a trusted partner for community associations.

Company Profile and Vulnerabilities

HGCT operates with a team of 11 attorneys, collectively bringing extensive experience in common interest development law. The firm’s focus on community associations has established it as a leader in its niche market. However, this specialization also makes it a prime target for cybercriminals seeking sensitive legal data. The firm's reliance on digital communication and data storage for client interactions may have exposed vulnerabilities that Cicada 3301 exploited.

Attack Overview

The ransomware attack was publicly disclosed on September 24, with Cicada 3301 claiming to have exfiltrated 152 GB of sensitive data. The stolen data has been made available on a dark web site, posing a significant threat to client confidentiality and operational security. This breach highlights the growing risk of ransomware attacks on law firms, which handle sensitive and valuable information.

About Cicada 3301

Cicada 3301 is a ransomware-as-a-service group that emerged in June. Unlike traditional ransomware groups, they focus on data exfiltration and long-term monetization rather than immediate ransom payments. Their operations involve a double-extortion model, threatening to release stolen data if demands are not met. The group is known for its sophisticated techniques, including the use of the Brutus botnet for initial access and ChaCha20 encryption for data protection.

Penetration Techniques

Cicada 3301 likely penetrated HGCT's systems through phishing campaigns or by exploiting vulnerabilities in VPN credentials. Their use of the Brutus botnet for brute-forcing access and advanced lateral movement techniques, such as PsExec, allowed them to navigate the firm's network undetected. The group's focus on data exfiltration before encryption maximizes the impact of their attacks, making recovery challenging for victims.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.