conti attacks Frutos Selectos De La Baja

Incident Date:

May 23, 2022

World map



conti attacks Frutos Selectos De La Baja


Frutos Selectos De La Baja




Tijuana, USA

California, USA

First Reported

May 23, 2022

Frutos Selectos de la Baja Suffers Ransomware Attack

Frutos Selectos de la Baja, a distinguished Mexican entity in the agriculture sector, recently fell victim to a ransomware attack orchestrated by the Conti group. This incident was disclosed on the group's clandestine dark web leak site. With a legacy spanning over three generations, Frutos Selectos de la Baja has built a reputation for its unwavering dedication to quality and customer satisfaction, serving millions of families and continually expanding its offerings to maintain the highest standards of product quality and service.

Company Profile

Rooted in a rich heritage, Frutos Selectos de la Baja has been a cornerstone in the Mexican agriculture industry for several generations. The company prides itself on a steadfast commitment to excellence and customer satisfaction, ensuring their products meet the highest quality standards. As it ventures into new markets, the company's focus remains on delivering superior service and products to both clients and consumers alike.

Vulnerabilities and Impact

The cyber assault on Frutos Selectos de la Baja is indicative of a growing trend of cyber threats targeting the food and agriculture sector. The FBI has issued warnings about the increased likelihood of ransomware attacks on agricultural cooperatives, especially during pivotal planting and harvest seasons. Such attacks pose risks of operational disruptions, financial losses, and broader implications for the food supply chain. The specific attack on Frutos Selectos de la Baja highlights the critical need for enhanced cybersecurity protocols within the sector to mitigate potential disruptions and safeguard the food supply chain.

Mitigation Strategies

In response to the escalating threat of ransomware, entities within the food and agriculture sector are advised to adopt comprehensive cybersecurity strategies. Essential measures include regular data backups, the development of a robust recovery plan, and the proactive identification and remediation of network vulnerabilities. Awareness of the risk of secondary infections, through either shared network resources or compromised managed services, is also crucial for maintaining cybersecurity integrity.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.