lockbit2 attacks danubiushotels....

Incident Date:

March 13, 2022

World map

Overview

Title

lockbit2 attacks danubiushotels....

Victim

danubiushotels....

Attacker

Lockbit2

Location

Budapest, Hungary

Szent, Hungary

First Reported

March 13, 2022

Danubius Hotels Suffers Ransomware Attack

Danubius Hotels, a prominent hospitality company with operations in Budapest, Balaton, Bükfürdő, Győr, Pécs, and London, recently fell victim to a ransomware attack orchestrated by the Lockbit2 group. This incident was confirmed through the group's dark web leak site, where they claimed responsibility for stealing data from the company.

As a key player in the hospitality industry, Danubius Hotels offers a wide range of services, including family vacations, all-inclusive experiences, city tours, and wellness packages. The company's website is a hub for information on their services, featuring various discounts and promotions for customers.

While the exact size and scope of Danubius Hotels are not detailed, the company's operations across multiple European locations indicate a significant footprint in the hospitality sector.

The specific vulnerabilities exploited in the ransomware attack on Danubius Hotels remain undisclosed. Nonetheless, it is clear that the Lockbit2 group was able to infiltrate the company's systems, encrypt their data, and disrupt operations. This incident underscores the critical importance of implementing comprehensive cybersecurity measures, such as regular vulnerability scanning, timely patching, and robust data backups, to mitigate the risk of ransomware attacks.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.