TASCO Plumbing & Mechanical Targeted in LockBit 3.0 Ransomware Attack

Incident Date:

April 19, 2024

World map

Overview

Title

TASCO Plumbing & Mechanical Targeted in LockBit 3.0 Ransomware Attack

Victim

TASCO Plumbing & Mechanical

Attacker

Lockbit3

Location

Hialeah, USA

Florida, USA

First Reported

April 19, 2024

Ransomware Attack on TASCO Plumbing & Mechanical by LockBit 3.0

Company Overview

TASCO Plumbing & Mechanical, a medium-sized construction company based in Hialeah, Florida, has been a notable player in the commercial and residential construction sector since its inception in 1996. Specializing in plumbing, heating, and air-conditioning services, the company employs between 51-100 individuals and generates annual revenue in the range of $10 million to $25 million.

The company has successfully carved out a niche in Florida's competitive construction landscape by focusing on high-quality and reliable service delivery.

On April 19, 2024, TASCO Plumbing & Mechanical fell victim to a ransomware attack orchestrated by the notorious LockBit 3.0 group.

Vulnerabilities and Industry Impact

The construction industry, despite its growing reliance on digital technologies for operations and management, often lags in cybersecurity measures. For a company like TASCO, which handles significant amounts of sensitive project and client data, this presents a substantial risk. The lack of advanced cybersecurity protocols and training can make such firms attractive targets for cybercriminals like those operating under the LockBit 3.0 banner.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.