Ransomware Hits Tankstar USA Lynx Group Takes Responsibility

Incident Date: Oct 09, 2024

Attack Overview
VICTIM
Tankstar
INDUSTRY
Transportation
LOCATION
USA
ATTACKER
Lynx
FIRST REPORTED
October 9, 2024

Ransomware Attack on Tankstar: Lynx Group Claims Responsibility

Tankstar USA, Inc., a prominent player in the transportation sector, has recently fallen victim to a ransomware attack orchestrated by the cybercriminal group known as Lynx. This incident highlights the vulnerabilities faced by companies in the logistics industry and underscores the persistent threat posed by sophisticated ransomware groups.

About Tankstar USA, Inc.

Founded in 1913 and headquartered in Milwaukee, Wisconsin, Tankstar USA, Inc. operates as a holding company for a network of independently run trucking and logistics firms. Specializing in the transportation of bulk commodities, particularly liquid chemicals and dry bulk materials, Tankstar has established itself as a significant player in the truck transportation and freight logistics sector. With a workforce of approximately 96 to 130 employees, the company generates an annual revenue of around $32.7 million. Tankstar is known for its commitment to safety and efficiency, emphasizing the importance of hiring experienced drivers and fostering a supportive work environment.

Details of the Ransomware Attack

The ransomware attack on Tankstar has resulted in the compromise of a substantial volume of data, indicating a significant breach of the company's information security protocols. While the specific nature of the data affected has not been disclosed, the volume suggests that critical operational or customer information may have been involved. Lynx, known for their sophisticated encryption techniques, typically demands a ransom in exchange for the decryption key, putting Tankstar in a precarious position as they assess the potential impact on their operations and data integrity.

Profile of the Lynx Ransomware Group

Lynx ransomware, first reported in July 2024, has quickly made its mark as a formidable cyber threat, attacking over 22 organizations mostly across the manufacturing and construction industries. Operating under a Ransomware-as-a-Service (RaaS) model, Lynx combines single and double extortion tactics, encrypting files while also exfiltrating sensitive data. The group primarily targets Windows systems, appending a .lynx extension to encrypted files while deleting shadow copies to hinder recovery. Despite claiming an "ethical" approach by avoiding attacks on government, healthcare, and non-profit organizations, Lynx’s operations have shown a clear intent to cause maximum disruption.

Potential Vulnerabilities and Entry Points

Tankstar's reliance on technology for logistics management and operational oversight may have presented vulnerabilities that Lynx exploited. The ransomware group employs phishing and malicious downloads as primary infection vectors, ensuring a wide range of entry points into victim environments. This attack serves as a stark reminder of the importance of effective cybersecurity measures in protecting sensitive data and maintaining operational integrity.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.