Ransomware Breach Exposes Direct Access Partners' Data

Incident Date: Sep 28, 2024

Attack Overview
VICTIM
Direct Access Partners
INDUSTRY
Finance
LOCATION
USA
ATTACKER
Inc Ransom
FIRST REPORTED
September 28, 2024

Ransomware Attack on Direct Access Partners by INC Ransom

Direct Access Partners, a New York-based financial services firm, has recently fallen victim to a ransomware attack orchestrated by the notorious INC Ransom group. This attack has raised significant concerns within the financial sector, given the firm's reputation for providing specialized brokerage services to institutional clients.

About Direct Access Partners

Direct Access Partners was an institutional brokerage firm known for its agency-only brokerage model, which emphasized client anonymity and non-conflicting execution across multiple asset classes. The firm specialized in global equity, options, and fixed income trading, catering primarily to institutional clients. With approximately 50 employees, the firm reported an estimated annual revenue of $23.9 million, reflecting its competitive position in the financial services sector. Despite its closure due to internal challenges, the firm's focus on client confidentiality and tailored financial solutions made it a standout in the industry.

Details of the Ransomware Attack

The INC Ransom group has claimed responsibility for the attack on Direct Access Partners, asserting that they have exfiltrated sensitive financial data and client information. This breach highlights the vulnerabilities that financial institutions face, particularly those with a history of operational challenges. The attack underscores the importance of effective cybersecurity measures, especially for firms handling sensitive financial transactions and client data.

Profile of INC Ransom

INC Ransom is a sophisticated cybercriminal group known for its targeted ransomware attacks on various industries, including finance, healthcare, and technology. The group employs advanced techniques such as spear-phishing and exploiting known vulnerabilities like CVE-2023-3519 in Citrix NetScaler. Their strategy involves double extortion, where they encrypt and steal data, threatening to release it publicly to pressure victims into paying the ransom. This approach has made them a formidable threat in the cybersecurity landscape.

Potential Vulnerabilities and Attack Vector

While the specific method of infiltration in the Direct Access Partners attack remains unclear, INC Ransom's known tactics suggest potential vulnerabilities in the firm's cybersecurity infrastructure. The use of spear-phishing and exploitation of software vulnerabilities are common entry points for such attacks. Given the firm's previous operational challenges, these vulnerabilities may have been exacerbated, making it an attractive target for cybercriminals.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.