DragonForce Ransomware Strikes Super Gardens, Exposes Data

Incident Date:

July 1, 2024

World map

Overview

Title

DragonForce Ransomware Strikes Super Gardens, Exposes Data

Victim

Super Gardens

Attacker

Dragonforce

Location

Essendon Fields, Australia

, Australia

First Reported

July 1, 2024

Analysis of the DragonForce Ransomware Attack on Super Gardens

Company Profile: Super Gardens

Super Gardens Pty Ltd, a prominent landscape construction and turf management company based in Australia, has been operational since 1990. The company specializes in a wide array of services including landscape design, construction, and maintenance, catering to commercial, government, and residential sectors. Known for its sustainable practices and innovative approaches, Super Gardens has established a strong reputation, particularly for managing complex projects and maintaining high-profile venues like the Melbourne Racing Club and La Trobe University. The company employs a dynamic team of professionals and has been actively involved in community support initiatives.

Overview of the Ransomware Attack

Earlier this month, Super Gardens fell victim to a ransomware attack orchestrated by the group known as DragonForce. The attackers claimed to have exfiltrated 120.1 gigabytes of sensitive data, setting a ransom deadline shortly after the breach. The compromised data, which was later leaked on the dark web, included internal documents, employee personal information, and details regarding high-profile clients. This incident highlights significant vulnerabilities in the company's cybersecurity measures, exposing sensitive data that could have severe financial and reputational repercussions.

Profile of DragonForce Ransomware Group

DragonForce is a newly emerged cyber threat group that employs double extortion tactics, which involve encrypting the victim's data and threatening to release it publicly if a ransom is not paid. The group has been active since late 2023 and is known for its rapid deployment of ransomware, likely facilitated by the use of leaked code from other notorious ransomware groups. DragonForce has targeted various organizations worldwide, indicating a high level of sophistication and global reach.

Potential Entry Points and Security Implications

The exact penetration method used by DragonForce in the attack on Super Gardens has not been publicly disclosed. However, common entry points for such attacks include phishing emails, compromised credentials, or unpatched vulnerabilities in the network. The extensive amount of data stolen suggests that the attackers had significant access to the company’s network, possibly indicating inadequate segmentation or insufficient monitoring of network traffic. This breach not only undermines the trust of clients and employees but also places the company at risk of regulatory scrutiny, especially concerning the handling of personal and sensitive information.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.