lorenz attacks Northern Contours Inc.

Incident Date:

August 22, 2022

World map

Overview

Title

lorenz attacks Northern Contours Inc.

Victim

Northern Contours Inc.

Attacker

Lorenz

Location

Corbin, USA

Kentucky, USA

First Reported

August 22, 2022

Northern Contours Inc. Ransomware Attack

About Northern Contours Inc.

Northern Contours Inc. is a leading manufacturer in the custom and volume cabinet door market, utilizing materials such as Thermofoil, Veneer, Acrylic, Melamine, and MDF. The company is renowned for its expertise in miter folding technology, which is applied in creating innovative solutions for floating shelves and wall panels.

Ransomware Attack

The Lorez ransomware group has targeted Northern Contours Inc., announcing the attack on their dark web leak site. Unfortunately, the specifics regarding the ransomware variant used and the full scope of the impact remain undisclosed.

Vulnerabilities and Mitigation

To defend against ransomware threats, it is imperative for organizations to adopt comprehensive cybersecurity strategies. These include conducting regular software updates, enforcing the use of strong passwords, and providing employee training on cybersecurity awareness. Furthermore, the development and implementation of a cybersecurity incident response plan are crucial for reducing the consequences of attacks and facilitating a rapid recovery process.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.