Monti Ransomware Hits Seng Tsoi Architect in Major Data Breach

Incident Date:

August 30, 2024

World map

Overview

Title

Monti Ransomware Hits Seng Tsoi Architect in Major Data Breach

Victim

Seng Tsoi Architect

Attacker

Monti

Location

Vancouver, Canada

, Canada

First Reported

August 30, 2024

Monti Ransomware Group Targets Seng Tsoi Architect in Significant Data Breach

Seng Tsoi Architect, a Vancouver-based architectural firm, has recently fallen victim to a ransomware attack orchestrated by the Monti group. This incident has resulted in the compromise of sensitive information, posing severe risks to the firm's operations and reputation.

About Seng Tsoi Architect

Founded in 2016 by Seng Tsoi, STA Office Architecture Inc. specializes in contemporary architectural design and consulting services. The firm is known for its innovative approach, integrating landscape and built forms to create cohesive and sustainable environments. With a team of approximately six employees, STA Office focuses on residential, commercial, and public space projects, emphasizing cultural and ecological considerations in their designs.

Vulnerabilities and Targeting

Despite its small size, STA Office handles a significant amount of sensitive client information, making it an attractive target for cybercriminals. The firm's commitment to innovative design and consulting services means it often collaborates with various partners, further increasing the risk of data breaches. The recent attack underscores the importance of stringent cybersecurity measures, particularly for firms in the architecture sector.

Attack Overview

The Monti ransomware group managed to infiltrate STA Office's systems, exfiltrating confidential data related to customers, employees, and contractual agreements. Additionally, information about the firm's partnerships with other companies was compromised. This breach highlights the severe risk to the privacy and security of all involved parties, with potential far-reaching implications for the firm's operations.

About Monti Ransomware Group

Monti ransomware emerged in June 2022, quickly gaining notoriety for its tactics that closely mirror those of the Conti group. The ransomware targets both Windows and Linux systems, with encrypted files typically bearing the ".puuuk" extension. Monti's ransom notes demand payment for decryption and threaten to leak sensitive data if the ransom is not paid. The group has shown adaptability by incorporating elements from previous ransomware variants and developing new techniques to evade detection.

Penetration Methods

Monti ransomware likely penetrated STA Office's systems through common entry points such as phishing emails or exploiting vulnerabilities in remote monitoring and maintenance tools. The group's use of the Action1 Remote Monitoring and Maintenance (RMM) agent, which was not previously associated with Conti attacks, indicates their evolving strategies to enhance effectiveness and evade detection.

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.