lockbit3 attacks Eclipse

Incident Date:

July 25, 2022

World map

Overview

Title

lockbit3 attacks Eclipse

Victim

Eclipse

Attacker

Lockbit3

Location

Parha, Czech Republic

Parha, Czech Republic

First Reported

July 25, 2022

Eclipse Print AS Targeted by Lockbit 3.0 Ransomware Group

Eclipse Print AS, a prominent company in the merchandise holding floorstands and large format advertising sector, has recently fallen victim to the Lockbit 3.0 ransomware group. With over 25 years of operational experience, Eclipse Print AS stands out as a market leader in the Business Services sector, boasting production sites and sales offices across Europe. The company is renowned for its innovative approach, developing new solutions, technological procedures, and utilizing cutting-edge materials.

The official website of Eclipse Print AS offers insights into their comprehensive range of services, which includes initial planning, production, logistics, co-packing, and installation. The company prides itself on maintaining fairness towards its clients, suppliers, and employees.

Lockbit 3.0, the ransomware group behind this attack, is notorious for its wide range of targets, including sectors such as manufacturing, communications, and healthcare. The group's modus operandi typically involves demanding ransoms paid in Bitcoin, with the amounts ranging from $1 million to $11 million. Phishing emails are often the starting point of their attacks.

As of now, Eclipse Print AS has not issued a public statement regarding the ransomware attack. The status of the ransom—whether it has been paid or if any data has been leaked—remains uncertain. Despite this, the company's website is still operational, showing no signs of the breach.

The Lockbit 3.0 group's history of attacks on critical infrastructure is well-documented, with their operations frequently beginning with phishing emails. They have also threatened to release stolen data from entities such as the city of Dallas unless a ransom is met.

It is crucial for Eclipse Print AS to take immediate steps to mitigate the impact of this ransomware attack. Recommended actions include isolating affected systems, restoring data from backups, and seeking the expertise of cybersecurity professionals to aid in the recovery process. Additionally, the company should inform affected parties and offer resources for identity monitoring and protection.

This analysis is based on information available at the time of writing and will be updated as new details emerge.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.