CertiCon Hit by DragonForce Ransomware: 40GB Data Stolen

Incident Date:

July 25, 2024

World map

Overview

Title

CertiCon Hit by DragonForce Ransomware: 40GB Data Stolen

Victim

CertiCon

Attacker

Dragonforce

Location

Praha, Czech Republic

, Czech Republic

First Reported

July 25, 2024

DragonForce Ransomware Group Claims Attack on CertiCon

Overview of the Attack

CertiCon, a prominent Czech technology company, has fallen victim to a ransomware attack orchestrated by the DragonForce group. The cybercriminals claim to have exfiltrated 40.37 GB of sensitive data from CertiCon's systems. The attackers have set a ransom deadline for August 1, 2024, demanding payment to prevent the release or further exploitation of the stolen data. This incident underscores the growing threat of ransomware attacks and the critical need for robust cybersecurity measures.

About CertiCon

Founded in 1996 and headquartered in Prague, CertiCon has evolved into a significant player in the technology sector, providing innovative IT and hardware solutions across various industries, including telecommunications, healthcare, industrial production, and security. The company operates in over 30 countries, including the USA, Canada, and Japan. CertiCon is known for its applied research and collaboration with numerous research institutions, enhancing its capability to deliver advanced technological solutions.

Core Services and Innovations

CertiCon specializes in software development, hardware design, testing, and prototyping, delivering custom solutions tailored to the specific needs of its clients. Notable innovations include CertiConVis, a comprehensive video analytics solution utilizing artificial intelligence for security and business applications. The company holds several international certifications, including ISO 9001, ISO 13485, ISO 14001, and ISO 45001, reflecting its commitment to quality and compliance.

Vulnerabilities and Targeting

Despite its robust reputation, CertiCon's extensive operations and valuable data make it an attractive target for ransomware groups like DragonForce. The company's involvement in critical sectors such as telecommunications and healthcare likely increases its vulnerability, as these industries often hold sensitive and high-value information. The attack on CertiCon highlights the importance of continuous vigilance and advanced cybersecurity measures to protect against sophisticated cyber threats.

About DragonForce Ransomware Group

DragonForce is a relatively new ransomware group that emerged in late 2023. They are known for using double extortion tactics, encrypting victims' data and exfiltrating sensitive information, which they threaten to release publicly if the ransom is not paid. DragonForce has claimed attacks against various high-profile victims across multiple countries. Their ransomware code is based on a leaked builder from the infamous LockBit ransomware group, suggesting a rapid development and deployment strategy.

Penetration Methods

While specific details of how DragonForce penetrated CertiCon's systems are not disclosed, it is likely that the group leveraged common vulnerabilities such as phishing attacks, unpatched software, or weak network security protocols. The use of sophisticated malware and double extortion tactics further complicates the defense against such attacks, emphasizing the need for comprehensive cybersecurity strategies.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.