Ransomware Breach at Andantex USA by Play Group

Incident Date: Sep 29, 2024

Attack Overview
VICTIM
Andantex USA
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Play
FIRST REPORTED
September 29, 2024

Ransomware Attack on Andantex USA by Play Ransomware Group

Andantex USA, a prominent player in the manufacturing sector, has recently fallen victim to a ransomware attack orchestrated by the notorious Play ransomware group. This breach has resulted in the unauthorized access and potential exfiltration of a wide array of sensitive data, posing significant risks to the company and its clients.

Company Profile: Andantex USA

Andantex USA, also known as Redex USA Inc., is a well-established manufacturer specializing in high-precision motion control components and systems. Headquartered in Ocean Township, New Jersey, the company has been operational since 1980. With approximately 21 employees and an annual revenue of around $22 million, Andantex USA serves industries such as machine tools, automation, material handling, and packaging. The company is renowned for its extensive product line, including servo planetary reducers, right angle gearboxes, and automatic lubrication systems, which position it as a leader in high-precision motion control solutions.

Attack Overview

The Play ransomware group has claimed responsibility for the attack on Andantex USA, which has led to the compromise of sensitive data, including client documents, payroll records, and financial data. The breach highlights the vulnerabilities that companies in the manufacturing sector face, particularly those with valuable intellectual property and critical operational data.

About the Play Ransomware Group

Active since June 2022, the Play ransomware group, also known as PlayCrypt, has been involved in numerous high-profile attacks across various industries. Initially targeting Latin America, the group has expanded its operations to North America and Europe. Play ransomware is known for exploiting vulnerabilities in RDP servers, FortiOS, and Microsoft Exchange, among others, to gain unauthorized access to networks. The group distinguishes itself by not including an initial ransom demand in its notes, directing victims to contact them via email instead.

Potential Vulnerabilities and Penetration Methods

Andantex USA's reliance on high-precision motion control systems and its extensive product portfolio make it an attractive target for ransomware groups seeking to disrupt operations and extract valuable data. The Play ransomware group likely exploited vulnerabilities in the company's network infrastructure, potentially through compromised VPN accounts or unpatched software vulnerabilities, to gain access to sensitive information.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.