lockbit3 attacks Cenviro Sdn. Bhd.

Incident Date:

August 26, 2022

World map

Overview

Title

lockbit3 attacks Cenviro Sdn. Bhd.

Victim

Cenviro Sdn. Bhd.

Attacker

Lockbit3

Location

Bukit Pelanduk, Malaysia

Port Dickson, Malaysia

First Reported

August 26, 2022

Cenviro Sdn. Bhd. Targeted by Lockbit3 Ransomware Group

About Cenviro

Cenviro Sdn. Bhd., an integrated waste management provider in Malaysia, has been targeted by the ransomware group Lockbit3. The attack was announced on the group's dark web leak site, and the victim's website was affected. With over three decades of experience in the waste management industry, Cenviro has played a pivotal role in driving positive change in Malaysia's environmental landscape. The company specializes in scheduled waste management through its subsidiary companies: Kualiti Alam, Cenviro Services, and Cenviro Recycling & Recovery.

Company Size and Industry Standout

Cenviro is a significant player in the waste management sector, focusing on sustainability and innovation. The company's commitment to environmental sustainability and employee well-being sets it apart in its industry.

Vulnerabilities

The specific vulnerabilities that led to the successful attack by Lockbit3 are not detailed. However, ransomware attacks often exploit unpatched software, weak passwords, or phishing emails to gain access to a system.

Response and Mitigation

The response from Cenviro or any mitigation measures taken to address the ransomware attack are not detailed in available sources. It is crucial for companies to have robust cybersecurity measures in place, including regular software updates, employee training, and incident response plans, to minimize the risk of such attacks.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.