Cyberattack on Jeyes Group Limited by LockBit 3.0 Ransomware Group
Incident Date:
April 15, 2024
Overview
Title
Cyberattack on Jeyes Group Limited by LockBit 3.0 Ransomware Group
Victim
Jeyes Group Limited
Attacker
Lockbit3
Location
First Reported
April 15, 2024
LockBit 3.0 Ransomware Attack on Jeyes Group Limited
Company Overview
Jeyes Group Limited, a private limited company based in Hemel Hempstead, United Kingdom, is renowned for its flagship product, Jeyes Fluid, a leader in outdoor disinfection with a history spanning over 140 years. Incorporated on May 16, 2002, the company primarily manages activities from its head office and employs approximately 310 individuals. With a reported revenue of $44.5 million, Jeyes stands out in the consumer services sector for its longstanding brand reputation and market presence.
Details of the Ransomware Attack
The LockBit 3.0 ransomware group, also known as LockBit Black, has recently claimed responsibility for a cyberattack on Jeyes Group Limited. This attack was publicized through their dark web leak site, indicating a serious security breach. LockBit 3.0, known for its disruptive capabilities, targets organizations globally, encrypting files and demanding ransom for decryption keys.
Vulnerabilities and Targeting
The choice of Jeyes Group Limited as a target by LockBit 3.0 could be attributed to several factors. As a company with significant historical brand value and substantial revenue, Jeyes presents a lucrative target for ransom demands. The visibility and reliance on digital processes make them vulnerable to such sophisticated cyber-attacks. The specifics of the attack vector and the extent of the data breach remain under investigation.
Sources
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.