lockbit3 attacks lane print
Incident Date:
July 22, 2022
Overview
Title
lockbit3 attacks lane print
Victim
lane print
Attacker
Lockbit3
Location
First Reported
July 22, 2022
Ransomware Attack on Lane Print
Lane Print, an Australian company specializing in print and digital communication solutions, has been targeted by the ransomware group Lockbit3. The attack was announced on the group's dark web leak site, and the victim's website is Lane Print. Lane Print operates in the Business Services sector and has been providing print and mail services across Australia for almost 50 years.
Company Size and Industry Standing
Lane Print is a well-established company with a long history in the print and mail industry. They are the preferred supplier of promotional and transactional print for many local, state, and federal government instrumentalities, as well as healthcare organizations and large retail groups. Their four service divisions - LaneIMPACT, LanePRINT, LanePOST, and LaneSMART - allow them to deliver customer communications effectively, consistently, and seamlessly across multiple channels.
Vulnerabilities and Targeting
The ransomware attack on Lane Print highlights the vulnerabilities that businesses in the print and mail industry face. While specific details about the attack are not available, it is known that Lockbit3 is responsible for the attack. The group is known for its ransomware-as-a-service model, where it handles the threats and negotiations while affiliates perform the actual extortion.
The attack on Lane Print underscores the need for businesses to prioritize cybersecurity measures, especially in industries that handle sensitive data. It is crucial for companies to regularly update their security patches, review service provider security annually, and incorporate a standard of security into contracts.
The ransomware attack on Lane Print serves as a reminder of the ongoing threat that cybercriminals pose to businesses across various sectors. As the digital landscape continues to evolve, it is essential for companies to stay vigilant and invest in robust cybersecurity measures to protect their operations and customer data.
Sources
- Lane Print: https://laneprint.com.au
- Cyber attack cripples CMA CGM website - Journal of Commerce: https://www.joc.com/article/cyber-attack-cripples-cma-cgm-website_20200928.html
- U.S. prescription drug market in disarray as ransomware gang attacks: https://www.washingtonpost.com/technology/2024/03/01/prescription-drug-hack-alphv/
- Ransomware Posts - GitHub Pages: https://privtools.github.io/ransomposts/
- Should you worry about the WannaCry ransomware attack?: https://www.sitebites.co.uk/worlds-news-events/worry-wannacry-ransomware-attack/
- Ransomware Attack Disrupts U.S Credit Unions - ACA International: https://www.acainternational.org/news/ransomware-attack-disrupts-u-s-credit-unions/
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.