Play Ransomware Group Attacks Goodman Reichwald-Dodge Inc., Data Compromised
Incident Date:
June 12, 2024
Overview
Title
Play Ransomware Group Attacks Goodman Reichwald-Dodge Inc., Data Compromised
Victim
Goodman Reichwald-Dodge Inc.
Attacker
Play
Location
First Reported
June 12, 2024
Ransomware Attack on Goodman Reichwald-Dodge Inc. by Play Group
Company Profile
Goodman Reichwald-Dodge Inc., headquartered in Brookfield, Wisconsin, specializes in auditing freight bills to ensure accuracy and compliance with agreed-upon rates and terms. The company employs between 21-50 people and has an estimated revenue of $10M-$25M. They stand out in the transportation sector by meticulously reviewing and verifying freight invoices to identify discrepancies, overcharges, and billing errors. Their expertise spans various shipping modes, including truckload, less-than-truckload (LTL), rail, air, and ocean freight.
Attack Overview
The ransomware group Play has claimed responsibility for a cyberattack on Goodman Reichwald-Dodge Inc. via their dark web leak site. The attack compromised private and personal confidential data, client documents, budget, payroll, accounting, contracts, taxes, IDs, and financial information. This breach has exposed sensitive information, potentially leading to identity theft, financial loss, and reputational damage. Immediate steps are being taken to contain the breach, assess the extent of the damage, and notify affected parties.
Ransomware Group Profile
Play ransomware, operated by Ransom House, is known for targeting Linux systems and is associated with the Babuk code. Initially, the group focused on data theft without encrypting files but has since adopted cryptographic lockers. Play ransomware uses Sosemanuk for encryption and is known for its verbose ransom notes. The group has been observed using various hack tools and utilities, such as AnyDesk and NetCat, to achieve initial access and deploy ransomware.
Potential Vulnerabilities
Goodman Reichwald-Dodge Inc.'s reliance on advanced auditing software and tools, along with their use of technologies like ASP.NET, JavaScript, HTML, and Google Analytics, may have presented vulnerabilities that the Play ransomware group exploited. The exact attack vector is under investigation by cybersecurity experts, who are working to enhance security measures to prevent future incidents.
Sources
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.