alphv attacks Royal Laser

Incident Date:

February 4, 2022

World map



alphv attacks Royal Laser


Royal Laser




Claireville, Canada

Etobicoke, Canada

First Reported

February 4, 2022

Royal Laser Mfg Inc. Suffers Ransomware Attack by Alphv Group

Company Overview

Royal Laser Mfg Inc., a North American manufacturing company, is recognized for its commitment to quality control and customer service. The company has established enduring relationships with suppliers to secure a steady supply of raw materials for its projects. Known for its rigorous quality control processes, Royal Laser Mfg Inc. monitors its products throughout the manufacturing cycle to minimize defects and enhance efficiency. Additionally, the company invests in cutting-edge machinery to uphold quality standards and stay abreast of technological advancements in the manufacturing industry.

Vulnerabilities and Impact

The ransomware attack on Royal Laser Mfg Inc. underscores the critical need for comprehensive cybersecurity defenses in the manufacturing sector. The Alphv group, a notorious ransomware entity, employs a variety of tactics to infiltrate target networks. These methods include exploiting business website contact forms and distributing trojanized malware through seemingly legitimate download sites. Upon gaining access, Alphv utilizes sophisticated exploitation techniques, such as deploying the Cobalt Strike penetration testing toolkit for command and control operations, using open-source tools like Nsudo, PowerShell scripts, and batch scripts to neutralize endpoint antivirus solutions, and extracting credentials for lateral movement within networks and compromising cloud services.

Alphv Group's Targeting Strategy

Alphv, also identified as Dev-0569, operates as a clandestine collective of high-skilled threat actors primarily motivated by financial extortion from large enterprises. The group's focus spans across various sectors, including manufacturing, positioning it as one of the most active and dangerous ransomware strains. Alphv's strategy often involves double extortion, where they threaten to delete or leak stolen data unless a ransom is paid.

Mitigation Strategies

To counteract the threat of ransomware, organizations are advised to implement several key strategies. These include conducting user awareness training, configuring email clients to alert users of emails from external sources, sourcing software exclusively from reputable providers, establishing a robust backup protocol with secure offline backups, performing regular vulnerability assessments and penetration testing, and securing Office applications with strong passwords and multi-factor authentication for remote access services.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.