lockbit2 attacks Datalit
Incident Date:
June 28, 2022
Overview
Title
lockbit2 attacks Datalit
Victim
Datalit
Attacker
Lockbit2
Location
First Reported
June 28, 2022
Datalit, a Canadian Education Sector Company, Suffers Ransomware Attack by Lockbit2
Company Overview
Datalit, a Canadian company, operates within the Education sector. Despite efforts, specific details regarding its size and distinguishing features remain elusive. Notably, Datalit has been embroiled in critical infrastructure ransomware attacks (CIRAs) since September 2019.
Vulnerabilities and Targeting
The precise vulnerabilities exploited by the ransomware group Lockbit2 in their attack on Datalit are not detailed. However, it is widely acknowledged that ransomware groups leverage software vulnerabilities, outdated systems, and human error to infiltrate networks and exfiltrate data.
Mitigation Strategies
Although the article lacks specific mitigation strategies for ransomware attacks, it underscores the importance of adopting comprehensive cybersecurity practices. These include regular software updates, thorough employee training, and the implementation of multi-factor authentication to diminish the likelihood of successful ransomware incursions.
Sources
- Canadian Institute for Cybersecurity datasets: https://www.unb.ca/cic/datasets/index.html
- Unit 42 Ransomware Leak Site Analysis: https://unit42.paloaltonetworks.com/unit-42-ransomware-leak-site-data-analysis/
- Critical Infrastructure Ransomware Attacks (CIRA) Dataset: https://sites.temple.edu/care/cira/
- Studying Ransomware Attacks Using Web Search Logs: https://pdeligia.github.io/lib/papers/ransomware_sigir20.pdf
- Ransomware - FBI: https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-scams-and-crimes/ransomware
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.