lockbit2 attacks GPML

Incident Date:

June 7, 2022

World map



lockbit2 attacks GPML






Jhanpa, India

West Bengal, India

First Reported

June 7, 2022

GPML, a Software Company, Suffers Ransomware Attack by Lockbit2

GPML, a company operating in the Software sector, has been targeted by the ransomware group Lockbit2. The attack was announced on the group's dark web leak site, and the victim's website is http://www.gpml.com. The size and specifics of the company are not readily available in the search results, but it is known that GPML is a software company.

Vulnerabilities and Mitigation

Ransomware attacks often exploit vulnerabilities in software, outdated systems, or human error. In the case of GPML, the specific vulnerabilities that led to the attack are not mentioned in the search results. However, it is recommended for all organizations to regularly update their systems, install the latest patches, and use intrusion prevention software to protect against such threats.

Background on Lockbit2

Lockbit2 is a ransomware group that has been in operation since September 2019. It is known for its rapid encryption of large organizations to prevent detection. The group has been responsible for several high-profile attacks, including the Kaseya ransomware attack in 2021.

The ransomware attack on GPML by Lockbit2 highlights the ongoing threat of cybercrime in the software sector. Organizations must remain vigilant and take proactive measures to protect their systems and data from such attacks.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.