lockbit2 attacks Plane Biz

Incident Date:

February 19, 2022

World map

Overview

Title

lockbit2 attacks Plane Biz

Victim

Plane Biz

Attacker

Lockbit2

Location

Harewood, New Zealand

Christchurch, New Zealand

First Reported

February 19, 2022

Plane Biz Ransomware Attack by LockBit2

Company Overview

Plane Biz operates within the transportation sector. Details regarding the company's size, distinctive characteristics, and potential vulnerabilities remain undisclosed.

LockBit2

LockBit2, a notorious ransomware group, has targeted various sectors, notably critical infrastructure, in its series of attacks. The group is recognized for its exploitation of zero-day vulnerabilities, facilitating unauthorized access to victim systems. Reports indicate that LockBit2 has amassed over $90 million in ransom payments from organizations within the United States.

Vulnerabilities and Mitigation

The exact vulnerabilities exploited in the Plane Biz attack by LockBit2 have not been specified. Nonetheless, it is imperative for organizations to adopt comprehensive cybersecurity practices. These include conducting regular software updates, providing employee cybersecurity training, and enforcing multi-factor authentication. Such measures are crucial in reducing the susceptibility to ransomware attacks.

The incident involving Plane Biz underscores the persistent cyber threat landscape confronting businesses across various industries. It is essential for companies to maintain vigilance and adopt proactive cybersecurity strategies to safeguard their digital assets against potential ransomware attacks.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.