lockbit2 attacks Rogz World HQ

Incident Date:

May 4, 2022

World map



lockbit2 attacks Rogz World HQ


Rogz World HQ




Montague Gardens, South Africa

Cape Town, South Africa

First Reported

May 4, 2022

Rogz World HQ Targeted by Lockbit2 Ransomware Group

Company Information

Rogz World HQ is a manufacturing company. However, detailed information regarding the company's size, distinctive characteristics, and specific vulnerabilities remains undisclosed.


The Lockbit2 ransomware group employs stealthy tactics, notably the use of compromised domain controllers to host malicious content, thereby evading traditional security measures. This approach suggests that Rogz World HQ's systems may have been compromised through such a controller, facilitating the ransomware's distribution via Group Policy Objects (GPOs) and enabling its execution across multiple domain-connected machines.

Mitigation Strategies

To counter the threat of ransomware attacks, organizations are advised to adopt several key strategies. These include restricting administrative privileges, ensuring security solutions are up-to-date, conducting regular backups of critical data, exercising caution with emails, attachments, URLs, and software execution, promoting the prompt reporting of suspicious emails and files by users, and providing ongoing education about the risks of social engineering.

The incident involving the Lockbit2 ransomware group and Rogz World HQ underscores the critical need for comprehensive cybersecurity practices within the manufacturing industry. To safeguard their operations and sensitive data, companies must remain alert to the sophisticated techniques employed by cybercriminals and adhere to the outlined mitigation strategies.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.