TASCO Plumbing & Mechanical Targeted in LockBit 3.0 Ransomware Attack
Incident Date:
April 19, 2024
Overview
Title
TASCO Plumbing & Mechanical Targeted in LockBit 3.0 Ransomware Attack
Victim
TASCO Plumbing & Mechanical
Attacker
Lockbit3
Location
First Reported
April 19, 2024
Ransomware Attack on TASCO Plumbing & Mechanical by LockBit 3.0
Company Overview
TASCO Plumbing & Mechanical, a medium-sized construction company based in Hialeah, Florida, has been a notable player in the commercial and residential construction sector since its inception in 1996. Specializing in plumbing, heating, and air-conditioning services, the company employs between 51-100 individuals and generates annual revenue in the range of $10 million to $25 million.
The company has successfully carved out a niche in Florida's competitive construction landscape by focusing on high-quality and reliable service delivery.
On April 19, 2024, TASCO Plumbing & Mechanical fell victim to a ransomware attack orchestrated by the notorious LockBit 3.0 group.
Vulnerabilities and Industry Impact
The construction industry, despite its growing reliance on digital technologies for operations and management, often lags in cybersecurity measures. For a company like TASCO, which handles significant amounts of sensitive project and client data, this presents a substantial risk. The lack of advanced cybersecurity protocols and training can make such firms attractive targets for cybercriminals like those operating under the LockBit 3.0 banner.
Sources
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.