lockbit3 attacks GAV resorst

Incident Date:

September 6, 2022

World map

Overview

Title

lockbit3 attacks GAV resorst

Victim

GAV resorst

Attacker

Lockbit3

Location

Centro, Brazil

Pirenópolis, Brazil

First Reported

September 6, 2022

GAV Resorts Suffers Ransomware Attack by Lockbit3 Group

Company Overview

GAV Resorts is a Brazilian hospitality company that offers vacation homes. The company's website provides information about their properties and services, including a section for booking reservations.

Industry Standout

GAV Resorts operates in the hospitality sector, which is a significant target for cybercriminals due to the vast amount of personal data that hotels and resorts collect from their customers. The industry has seen a surge in ransomware attacks in recent years, with high-profile cases such as the MGM Resorts attack in 2023, which cost the company over $110 million.

Vulnerabilities

The Lockbit3 ransomware group is known for exploiting vulnerabilities in outdated software and unpatched systems. In the case of MGM Resorts, the attack was facilitated by a social engineering attack on an employee, who was tricked into granting access to the company's systems. This highlights the importance of employee training and awareness in preventing such attacks.

The ransomware attack on GAV Resorts by Lockbit3 is a reminder of the ongoing threat that cybercriminals pose to the hospitality sector. Companies in this industry must prioritize cybersecurity measures, including regular software updates, employee training, and robust incident response plans, to mitigate the risk of such attacks.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.