ShoreMaster Ransomware Breach by Akira Highlights Cyber Risks

Incident Date: Oct 01, 2024

Attack Overview
VICTIM
ShoreMaster
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Akira
FIRST REPORTED
October 1, 2024

Ransomware Attack on ShoreMaster: A Closer Look at the Akira Breach

ShoreMaster, a leading manufacturer in the marine equipment industry, has fallen victim to a ransomware attack orchestrated by the notorious Akira group. Known for its innovative waterfront solutions, ShoreMaster specializes in producing high-quality docks, boat lifts, and accessories that cater to both residential and commercial needs. The company, part of the Waterfront Brands portfolio, is recognized for its commitment to quality and customer satisfaction, making it a prominent player in the industry.

Company Profile and Vulnerabilities

Founded in 1972, ShoreMaster operates primarily out of Fergus Falls, Minnesota, with additional facilities in Oklahoma and Florida. The company employs a dedicated workforce and boasts an extensive dealer network, ensuring top-notch customer service. With an estimated revenue of $24.6 million, ShoreMaster's market presence is significant, driven by its focus on innovation and quality craftsmanship. However, like many in the manufacturing sector, ShoreMaster's reliance on digital systems for operations and customer interactions makes it vulnerable to cyber threats.

Details of the Attack

The Akira ransomware group claims to have infiltrated ShoreMaster's systems, accessing 15 GB of sensitive data. This breach highlights the ongoing threat posed by ransomware groups to businesses across various sectors. The attack underscores the importance of effective cybersecurity measures to protect sensitive information and maintain operational integrity. The exact method of infiltration remains unclear, but Akira is known for exploiting vulnerabilities in VPN software and using compromised credentials to gain unauthorized access.

About the Akira Ransomware Group

Emerging in March 2023, Akira has quickly gained notoriety for its sophisticated attack methods and extensive targeting capabilities. The group employs a hybrid encryption scheme, combining ChaCha20 and RSA cryptography, and operates using a double-extortion model. Akira distinguishes itself by not only encrypting data but also exfiltrating sensitive information, pressuring victims to pay ransoms by threatening data publication. The group has been linked to the defunct Conti ransomware, sharing similar methodologies and tools.

Potential Penetration Methods

Akira's penetration into ShoreMaster's systems could have been facilitated through several vectors. The group is known for exploiting vulnerabilities in VPN software, utilizing compromised login credentials, and distributing infected email attachments. Once inside, Akira employs PowerShell commands to delete volume shadow copies, complicating recovery efforts. The group's use of "living off the land" techniques further complicates detection, as they leverage legitimate system tools for malicious purposes.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.