Cyberattack on Jeyes Group Limited by LockBit 3.0 Ransomware Group

Incident Date:

April 15, 2024

World map



Cyberattack on Jeyes Group Limited by LockBit 3.0 Ransomware Group


Jeyes Group Limited




Hemel Hempstead, United Kingdom

, United Kingdom

First Reported

April 15, 2024

LockBit 3.0 Ransomware Attack on Jeyes Group Limited

Company Overview

Jeyes Group Limited, a private limited company based in Hemel Hempstead, United Kingdom, is renowned for its flagship product, Jeyes Fluid, a leader in outdoor disinfection with a history spanning over 140 years. Incorporated on May 16, 2002, the company primarily manages activities from its head office and employs approximately 310 individuals. With a reported revenue of $44.5 million, Jeyes stands out in the consumer services sector for its longstanding brand reputation and market presence.

Details of the Ransomware Attack

The LockBit 3.0 ransomware group, also known as LockBit Black, has recently claimed responsibility for a cyberattack on Jeyes Group Limited. This attack was publicized through their dark web leak site, indicating a serious security breach. LockBit 3.0, known for its disruptive capabilities, targets organizations globally, encrypting files and demanding ransom for decryption keys.

Vulnerabilities and Targeting

The choice of Jeyes Group Limited as a target by LockBit 3.0 could be attributed to several factors. As a company with significant historical brand value and substantial revenue, Jeyes presents a lucrative target for ransom demands. The visibility and reliance on digital processes make them vulnerable to such sophisticated cyber-attacks. The specifics of the attack vector and the extent of the data breach remain under investigation.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.