lockbit2 attacks vgoc

Incident Date:

April 6, 2022

World map



lockbit2 attacks vgoc






Sherwood Park, Canada

Alberta, Canada

First Reported

April 6, 2022

VGOC Construction Firm Targeted by Lockbit2 Ransomware Group

Company Overview

VGOC is a construction firm that provides services in various sectors, including commercial, industrial, and institutional projects. The company's website showcases its portfolio and services, indicating a strong presence in the industry.

Vulnerabilities and Mitigation

Ransomware attacks often exploit vulnerabilities in outdated software, unpatched systems, or weak passwords. To mitigate these risks, VGOC should ensure that all software and systems are up-to-date with the latest patches and security updates. Additionally, implementing strong password policies and multi-factor authentication can help protect against unauthorized access.

Previous Ransomware Attacks

Lockbit2 is a well-known ransomware group that has been active since 2020. The group has been responsible for several high-profile attacks, including those on the City of Pensacola and the University of California, San Francisco.

Response and Recovery

In the event of a ransomware attack, VGOC should immediately disconnect infected devices from the network to prevent further spread. The company should also contact law enforcement and seek professional assistance to recover from the attack.

The Lockbit2 ransomware attack on VGOC underscores the critical need for cybersecurity vigilance within the construction sector. Companies must remain proactive in safeguarding their systems and data against cyber threats.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.