lockbit2 attacks alaliengineerin...

Incident Date:

March 25, 2022

World map

Overview

Title

lockbit2 attacks alaliengineerin...

Victim

alaliengineerin...

Attacker

Lockbit2

Location

Doha, Qatar

Doha, Qatar

First Reported

March 25, 2022

Al Ali Engineering: A Targeted Ransomware Attack

Company Overview

Al Ali Engineering, a prominent entity in the Qatari construction industry for over two decades, offers a broad spectrum of services. The company's project portfolio showcases a commitment to excellence across commercial and residential buildings, heritage projects, and the enhancement of existing landmarks and sites.

Vulnerabilities and Targeting

The recent ransomware attack on Al Ali Engineering sheds light on the cybersecurity vulnerabilities inherent in the construction sector. With the industry's shift towards digitalization, it becomes a more attractive target for cybercriminals. The Lockbit2 ransomware group likely exploited weaknesses in the company's IT infrastructure, employing tactics such as phishing to gain unauthorized access.

Impact and Response

This cyberattack has significantly disrupted Al Ali Engineering's operations, with potential for considerable financial and operational repercussions. Details regarding the extent of the damage and the company's response strategy remain undisclosed.

The incident at Al Ali Engineering serves as a critical reminder of the necessity for stringent cybersecurity protocols in the construction industry. As reliance on digital technologies escalates, safeguarding against cyber threats like ransomware must be a top priority.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.