Ransomware Hits J.S. McCarthy Printers Exposing 652GB Data

Incident Date: Nov 01, 2024

Attack Overview
VICTIM
JS McCarthy Printers
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Play
FIRST REPORTED
November 1, 2024

Ransomware Attack on J.S. McCarthy Printers by Play Group

J.S. McCarthy Packaging + Print, a prominent commercial printing company based in Augusta, Maine, recently experienced a ransomware attack executed by the infamous Play ransomware group. Discovered on November 4, the attack resulted in the theft of 652GB of sensitive data, encompassing client documents, payroll records, and financial information. This breach presents a substantial risk to the company's operations and its clientele.

About J.S. McCarthy Printers

Established in 1947, J.S. McCarthy Printers stands as one of New England's largest and most enduring commercial printing firms. Specializing in folded carton packaging, the company provides a variety of services, including offset printing, consultation, and logistics. In 2019, J.S. McCarthy transitioned to a fully employee-owned model, promoting a culture of shared success and dedication to customer service. Their cutting-edge technology and skilled workforce have cemented their leadership in the industry.

Vulnerabilities and Attack Details

The Play ransomware group claims to have accessed a significant amount of confidential data from J.S. McCarthy's systems. This breach exposes potential weaknesses in the company's cybersecurity framework, which may have been exploited by the attackers. Known for their diverse methods of network infiltration, the Play group often exploits RDP servers and Microsoft Exchange vulnerabilities. While the full scope of the data leak is still uncertain, the nature of the stolen information indicates a serious impact on the company and its clients.

Profile of the Play Ransomware Group

Active since June 2022, the Play ransomware group has targeted a wide array of industries, including IT, transportation, and government sectors. The group is notable for omitting an initial ransom demand in its notes, instead instructing victims to contact them via email. Play ransomware utilizes advanced techniques, such as custom tools and the exploitation of known vulnerabilities, to infiltrate and maintain persistence in compromised systems.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.