lockbit3 attacks Equator Trustees

Incident Date:

September 16, 2022

World map

Overview

Title

lockbit3 attacks Equator Trustees

Victim

Equator Trustees

Attacker

Lockbit3

Location

, Australia

Victoria, Australia

First Reported

September 16, 2022

Equator Trustees Limited: A Target for Ransomware Attacks

Company Overview

Equator Trustees Limited, a Seychelles-based corporate and trustee service provider, is licensed by the Seychelles Financial Services Authority (FSA). The company offers a comprehensive suite of services to both individual and corporate clients globally, focusing on legal services, company and trust formation, and administration. With a broad network of professional contacts in various fields and strong relationships with local banks and accountants, Equator Trustees provides tailored "add-on" services to meet specific client needs.

Vulnerabilities and Targeting

Ransomware attacks often target entities with critical data or systems, where disruption can lead to significant operational and financial impacts. Equator Trustees, with its expertise in legal services and administration, presents a lucrative target for ransomware groups. The company's international client base and extensive professional network further amplify its attractiveness to cybercriminals seeking to exploit system vulnerabilities or access sensitive information.

Ransomware Attack Stages

Ransomware attacks generally unfold in three stages:

  1. Gaining Access: Threat actors gain network access through various means such as social engineering, exploiting vulnerabilities, or deploying malware. External exposure is a primary access point, accounting for 70.1% of Arctic Wolf Incident Response cases in 2023.
  2. Moving Laterally and Vertically: The attacker navigates through the network, seeking critical technology or valuable data. This stage may involve gaining privileged access, exploiting Active Directory vulnerabilities, initiating spear-phishing campaigns, or deploying further malware.
  3. Launching the Ransomware Attack: The final stage involves executing the ransomware attack to encrypt important files and demand a ransom for their release. Failure to pay may result in the publication of exfiltrated data on the dark web or permanent loss of access to encrypted files.

Mitigating Ransomware Attacks

To reduce the risk of ransomware attacks, organizations are advised to adhere to best practices such as regular file backups, cloud environment security, identity and access management, vulnerability management, and implementing round-the-clock monitoring, detection, and response mechanisms.

The ransomware attack on Equator Trustees Limited underscores the growing cybercrime threat within the finance sector. As digital transformation progresses, vigilance against ransomware tactics becomes crucial. Adopting comprehensive cybersecurity measures and staying informed about emerging threats can significantly enhance protection against the adverse effects of ransomware attacks.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.