PressureJet Systems Pvt. Ltd. Hit by LockBit3 Ransomware Attack

Incident Date:

May 27, 2024

World map

Overview

Title

PressureJet Systems Pvt. Ltd. Hit by LockBit3 Ransomware Attack

Victim

PressureJet Systems Pvt. Ltd.

Attacker

Lockbit3

Location

Ahmedabad, India

, India

First Reported

May 27, 2024

Ransomware Attack on PressureJet Systems Pvt. Ltd.

Company Overview

PressureJet Systems Pvt. Ltd. is a manufacturing company specializing in high-pressure water jetting equipment and systems. With over 20 years of experience, the company offers a wide range of products including high-pressure pumps, water blasting machines, and accessories. They cater to industries such as cleaning, surface preparation, hydro demolition, and industrial cleaning, providing customized solutions to meet specific customer needs.

Company Size and Standout Features

While the exact size of PressureJet Systems Pvt. Ltd. is not specified, the company is known for its commitment to quality products at competitive prices. They have a well-managed base in Ahmedabad and serve clients that include major corporations like BHEL, Reliance Industries, and ONGC.

Company Vulnerabilities

PressureJet Systems Pvt. Ltd. may have been targeted by threat actors like the LockBit3 ransomware group due to the sensitive nature of their industry. As a manufacturer of critical equipment used in various sectors, the company's operations could be severely impacted by a ransomware attack, leading to potential disruptions in essential services.

Attack Overview

The LockBit3 ransomware group targeted PressureJet Systems Pvt. Ltd. on May 27, 2024. The attack resulted in the leakage of sample data from the company, potentially compromising sensitive information and disrupting their business operations.

Ransomware Group Profile

LockBit3, also known as LockBit Black, is a sophisticated ransomware group that encrypts files, modifies filenames, changes desktop wallpapers, and drops ransom notes on victims' desktops. Operating under a Ransomware-as-a-Service (RaaS) model, LockBit3 allows other cybercriminals to utilize their malware for attacks.

Penetration Methods

LockBit3 distinguishes itself by its advanced capabilities, including lateral movement through networks via group policy updates and the ability to delete traces of its presence to evade detection. The ransomware is heavily obfuscated and protected against analysis, making it challenging for security researchers to study and mitigate.

Sources:

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.