DragonForce Ransomware Hits Hayes Beer Distributing: 5GB Data Stolen

Incident Date:

August 2, 2024

World map

Overview

Title

DragonForce Ransomware Hits Hayes Beer Distributing: 5GB Data Stolen

Victim

Hayes Beer Distributing

Attacker

Dragonforce

Location

Alsip, USA

Illinois, USA

First Reported

August 2, 2024

DragonForce Ransomware Attack on Hayes Beer Distributing

Hayes Beer Distributing Co., a prominent beer distributor based in Alsip, Illinois, has recently fallen victim to a ransomware attack orchestrated by the DragonForce group. The attackers claim to have exfiltrated 4.83 GB of sensitive data and have threatened to release it publicly if their demands are not met within the next 6–7 days.

About Hayes Beer Distributing

Hayes Beer Distributing is a leading beverage sales and operations company, primarily focused on the distribution of a wide variety of beers. Established in 1956 by Jim and Jack Hayes, the company has grown to become one of the largest beer distributors in Illinois, serving over 3,000 retail accounts. With a workforce of approximately 400 employees across its Alsip and Rockford locations, Hayes Beer Distributing represents major breweries such as Heineken, Boston Beer Company, and Sierra Nevada, alongside craft breweries like Dogfish Head and Revolution Brewing.

Attack Overview

The DragonForce ransomware group has claimed responsibility for the attack on Hayes Beer Distributing. The group has stated that they have infiltrated the company's systems and obtained nearly 5 GB of sensitive data. This data is at risk of being released publicly if the ransom demands are not met, posing a significant threat to the company's operations and reputation.

About DragonForce Ransomware Group

DragonForce is a relatively new ransomware group that emerged in late 2023. They are known for their double extortion tactics, which involve encrypting victims' data and exfiltrating sensitive information. If the ransom is not paid, they threaten to release the stolen data on their "DragonLeaks" dark web site. The group has been linked to several high-profile attacks across various industries and countries, including the Ohio Lottery and Coca-Cola Singapore.

Potential Vulnerabilities

While the exact method of infiltration remains unclear, DragonForce is known to leverage leaked malware code, such as that from the LockBit ransomware group, to develop and deploy their attacks. This suggests that Hayes Beer Distributing may have been vulnerable due to outdated security measures or insufficient cybersecurity protocols, making them an attractive target for such sophisticated threat actors.

Implications for Hayes Beer Distributing

The ransomware attack on Hayes Beer Distributing highlights the growing threat of cyberattacks on the retail sector. With a significant amount of sensitive data at risk, the company faces potential operational disruptions and reputational damage. The incident underscores the importance of robust cybersecurity measures to protect against increasingly sophisticated ransomware groups like DragonForce.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.