Dunghill Leak attacks Incredible Technologies

Incident Date:

May 29, 2023

World map

Overview

Title

Dunghill Leak attacks Incredible Technologies

Victim

Incredible Technologies

Attacker

Dunghill

Location

Vernon Hills, USA

CA, USA

First Reported

May 29, 2023

Incredible Technologies Hit by Ransomware Attack

Incredible Technologies, a US-based video game developer and manufacturer, has been hit with a ransomware attack. Dunghill Leak ransomware group has claimed responsibility for the attack, posting Incredible Technologies on its dark web blog page on May 29. The ransomware group claims to have stolen 500GB of company data, including binaries and source codes for 58 slot machine games, documentation, and confidential data. Stolen data also includes source files for application development, SolidWorks drawings, schematics, 3D models, parts lists for game stations, and accounting and tax reports from 2011-2022.

Dunghill Leak is thought to be a rebrand of an older ransomware gang known as Dark Angels, which was first identified in May 2022. The group deploys the Babuk ransomware variant, which attempts to inhibit system recovery and terminate any process that could interfere with the encryption process.

Incredible Technologies, headquartered in Illinois, US, develops and manufactures coin-operated and Class III video games and employs roughly 200 people. The company has neither confirmed nor denied the incident.

Ransomware Attacks on the Rise

Ransomware attacks typically involve threat groups encrypting an organization’s data and demanding a ransom for the decryption key. Cybercriminals typically target organizations that will suffer greatly from stolen data or downtime, and that can afford to pay ransoms.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.