lockbit2 attacks Pietro Isnardi S.R.L.
Incident Date:
January 27, 2022
Overview
Title
lockbit2 attacks Pietro Isnardi S.R.L.
Victim
Pietro Isnardi S.R.L.
Attacker
Lockbit2
Location
First Reported
January 27, 2022
Pietro Isnardi S.R.L. Targeted by Lockbit2 Ransomware Group
Pietro Isnardi S.R.L., a company with a rich history dating back to 1908 and a focus on olive oil production, has been targeted by the Lockbit2 ransomware group. The attack was announced on the group's dark web leak site. The company operates in the Manufacturing sector and is known for its commitment to tradition and innovation in the production of high-quality olive oil products.
Company Overview
Pietro Isnardi S.R.L. is a family-owned business that has been in operation for over a century. The company's roots are deeply connected to the Liguria region, which is known for its excellent olive oil products. Pietro Isnardi, the founder of the company, was a visionary and entrepreneurial leader who established the company and set the foundation for its strong vocation for olive oil production. Today, the company looks to the future, with plans to improve its production organization and expand its portfolio of brands to cater to various market segments.
Vulnerabilities and Targeting
The specific vulnerabilities that led to the successful attack on Pietro Isnardi S.R.L. by the Lockbit2 ransomware group are not detailed. However, it is known that ransomware attacks often exploit weaknesses in software, outdated systems, or human error, such as phishing attacks or unpatched vulnerabilities.
Ransomware groups like Lockbit2 target victims worldwide, including critical infrastructure sectors like Manufacturing, Communications, Healthcare and Public Healthcare (HPH), and Education. The group has been active since approximately September 2022 and has targeted over 350 known victims worldwide, with ransom demands exceeding 275 million USD.
Mitigation Strategies
To mitigate the risks of ransomware attacks, organizations should prioritize remediating known exploited vulnerabilities, train users to recognize and report phishing attempts, and enable and enforce multifactor authentication. Additionally, implementing patches and updates on all third-party software or applications as soon as they become available, developing a data retention policy, and regularly deleting unnecessary data can help protect against ransomware attacks.
The Lockbit2 ransomware group's attack on Pietro Isnardi S.R.L. underscores the importance for organizations to remain vigilant against cyber threats and to implement robust security measures to protect against ransomware attacks. By prioritizing security and staying informed about the latest threats, companies can better protect their operations and data from cybercriminals.
Sources
- Ukrainian Arrested and Charged with Ransomware Attack on Kaseya - https://www.justice.gov/opa/pr/ukrainian-national-arrested-and-charged-deployment-ransomware
- SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security - https://ieeexplore.ieee.org/document/9152781
- Information Regulator issues first fine to the Department of Justice after ransomware attack - https://www.sabcnews.com/sabcnews/information-regulator-issues-first-fine-to-the-department-of-justice-after-ransomware-attack/
- #StopRansomware: Royal Ransomware | CISA - https://www.cisa.gov/uscert/ncas/alerts/aa22-181a
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.