lockbit2 attacks OAK Book

Incident Date:

June 26, 2022

World map



lockbit2 attacks OAK Book


OAK Book




Oak Brook, USA

Oak Brook, USA

First Reported

June 26, 2022

OAK Book Targeted by Lockbit2 Ransomware Attack

OAK Book, a company operating in the Media & Internet sector, has been targeted by the ransomware group Lockbit2. The attack was announced on the group's dark web leak site, and the victim's website is currently under threat. The company's size and specific industry niche are not explicitly mentioned, indicating a broader vulnerability within the Media & Internet sector to such cyber threats.

Vulnerabilities and Targeting

Ransomware attacks often exploit vulnerabilities in outdated software, unpatched systems, or weak passwords. While the specific vulnerabilities exploited by the Lockbit2 group in the attack on OAK Book remain undisclosed, this incident underscores the critical importance for companies to maintain up-to-date software, regularly patch systems, and enforce strong password policies to minimize the risk of ransomware attacks.

Mitigation Strategies

To mitigate the risk of ransomware attacks, companies are advised to implement a multi-layered security strategy. Essential components of such a strategy include:

  • Regular software updates and patches
  • Employee training on cybersecurity best practices
  • Strong password policies
  • Backup and disaster recovery plans
  • Network segmentation
  • Endpoint protection
  • Email filtering and spam protection
  • Firewalls and intrusion detection systems
  • Incident response plans

By adopting these measures, companies can significantly enhance their cybersecurity posture and reduce the likelihood of succumbing to ransomware attacks.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.