Vulnerabilities Exposed: O'Connell Mahon Architects Hit by Ransomware Attack

Incident Date: May 04, 2024

Attack Overview
VICTIM
O'Connell Mahon Architects
INDUSTRY
Construction
LOCATION
Ireland
ATTACKER
dAn0n
FIRST REPORTED
May 4, 2024

Ransomware Attack on O'Connell Mahon Architects by dAn0n Group

Company Profile: O'Connell Mahon Architects

O'Connell Mahon Architects, a prominent Dublin-based architectural firm, has a rich history spanning over 50 years, evolving from Brian O'Connell Associates. With a strong focus on healthcare architecture, the firm has delivered over 100 projects in the last fifteen years, including major hospital projects like the MISA facility at St. James's Hospital and the National Maternity Hospital. Their portfolio also extends to education, residential, and urban design. The firm is noted for its commitment to sustainability, holding an ISO 14001:2015 Certification.

Details of the Ransomware Attack

The ransomware group dAn0n, known for its recent emergence in the cybercrime arena, has claimed responsibility for a significant attack on O'Connell Mahon Architects. The attack resulted in the theft of approximately 1TB of data, including sensitive corporate information such as financial records, legal documents, employee data, and extensive details on clients including personal data and legal contracts.

Analysis of Vulnerabilities and Group Tactics

The firm, with its significant digital footprint in the architecture and design industry, holds vast amounts of sensitive data, making it an attractive target for ransomware attacks. The firm's extensive project data and client information present high-value targets for cybercriminals looking to exploit or ransom such information for financial gain.

dAn0n, although a newer player in the ransomware landscape, has quickly distinguished itself by targeting organizations with substantial data caches and vulnerabilities in their network security. The method of penetration, while not explicitly detailed, likely involved phishing, exploitation of unpatched systems, or compromised credentials, common entry points for ransomware attackers seeking to infiltrate corporate networks.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.