lockbit3 attacks mec

Incident Date:

July 20, 2022

World map

Overview

Title

lockbit3 attacks mec

Victim

mec

Attacker

Lockbit3

Location

New Delhi, India

Delhi, India

First Reported

July 20, 2022

Mack Energy Corporation Suffers Ransomware Attack by Lockbit3

Company Overview

Mack Energy Corporation, a prominent entity in the Energy, Utilities & Waste sector, has been dedicating over 50 years to the exploration and production of oil and natural gas. The company prides itself on fueling the future while prioritizing safety, technological advancements, and exceptional customer service through its various affiliate companies.

Vulnerabilities and Targeting

The specific vulnerabilities that facilitated the ransomware attack on Mack Energy Corporation remain undisclosed. Nonetheless, it is widely acknowledged that ransomware groups exploit weaknesses such as outdated software, insufficiently robust passwords, and systems lacking timely patches.

Mitigation Strategies

Organizations can mitigate the impact of ransomware attacks through comprehensive user education, stringent cybersecurity protocols, and a clearly articulated incident response strategy. Essential measures include conducting regular phishing awareness programs, ensuring software is consistently updated, enforcing the use of strong passwords, and steering clear of dubious websites. The deployment of endpoint protection solutions, like antivirus programs and endpoint detection and response (EDR) systems, plays a critical role in identifying and neutralizing ransomware threats preemptively. Moreover, maintaining regular backups and verifying their integrity is vital for the recovery of critical data without succumbing to ransom demands.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.