LockBit Ransomware Hits Ignitarium Raising Data Security Concerns

Incident Date:

September 15, 2024

World map

Overview

Title

LockBit Ransomware Hits Ignitarium Raising Data Security Concerns

Victim

Ignitarium

Attacker

Lockbit3

Location

Bengaluru, India

, India

First Reported

September 15, 2024

LockBit Ransomware Attack on Ignitarium

Ignitarium, a prominent product engineering services company specializing in semiconductor design, embedded systems, and software development, has fallen victim to a ransomware attack orchestrated by the notorious LockBit group. The attack was explicitly claimed by LockBit on their dark web leak site, raising concerns about the potential impact on Ignitarium's operations and data security.

About Ignitarium

Founded in 2012, Ignitarium Technology Solutions Pvt Ltd has established itself as a key player in the technology sector, particularly in India. The company operates globally with offices in India (Bengaluru, Chennai, and Kochi), the USA (San Jose and Austin), Japan, Canada, and Germany. Ignitarium employs approximately 267 individuals and is recognized for its innovative engineering solutions across various domains, including semiconductor design, AI, and wireless-enabled embedded systems.

Ignitarium's core competencies include semiconductor design, FPGA prototyping, and embedded software development. The company also excels in multimedia and artificial intelligence applications, providing comprehensive solutions for complex engineering challenges. Ignitarium's collaborative approach and commitment to fostering a high-trust and high-performance culture have earned it certification from the Great Place to Work® Institute.

Attack Overview

The LockBit ransomware group, known for its sophisticated encryption techniques and double extortion tactics, claimed responsibility for the attack on Ignitarium. While specific details about the method of infiltration and the extent of the data compromised have not been disclosed, LockBit's modus operandi typically involves exploiting vulnerabilities in Remote Desktop Protocol (RDP) services and unsecured network shares to spread quickly across a network.

LockBit employs a combination of RSA-2048 and AES-256 encryption algorithms to encrypt victims' files and demands ransom payments in Bitcoin. The group is known for exfiltrating sensitive data and threatening to release it publicly if the ransom is not paid. This attack on Ignitarium underscores the growing threat posed by ransomware groups to companies in the technology sector.

About LockBit

LockBit is a highly sophisticated ransomware-as-a-service (RaaS) group that has been active since September 2019. It has become the most active ransomware group, responsible for over one-third of all ransomware attacks in the latter half of 2022 and the first quarter of 2023. LockBit's modular ransomware encrypts its payload until execution to hinder malware analysis and detection, making it a formidable threat to organizations worldwide.

LockBit distinguishes itself through its use of double extortion tactics and its ability to spread rapidly across networks by exploiting vulnerabilities. The group also performs checks to avoid executing on computer systems with installed languages common to the Commonwealth of Independent States (CIS) region, indicating a strategic focus on targeting specific regions.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.