Qilin Ransomware Strikes Above All Store Fronts

Incident Date:

June 8, 2024

World map

Overview

Title

Qilin Ransomware Strikes Above All Store Fronts

Victim

Above All Store Fronts

Attacker

Qilin

Location

Hauppauge, USA

New York, USA

First Reported

June 8, 2024

Qilin Ransomware Group Targets Above All Store Fronts

Overview of the Attack

The Qilin ransomware group, also known as Agenda, has claimed responsibility for a significant ransomware attack on Above All Store Fronts, a leading architectural glazing and cladding service provider in the greater New York area. The breach, discovered on June 4, 2024, resulted in a data leak of 1.7TB, severely impacting the company's operations.

About Above All Store Fronts

Above All Store Fronts, Inc. is a family-owned business established in 1993, specializing in the design, fabrication, and installation of commercial storefronts and architectural glass systems. The company employs over 200 skilled professionals and has built a strong reputation in the construction sector, particularly in the tri-state area. Their comprehensive services, from initial consultation to final installation, cater to a variety of commercial projects, including retail spaces and office buildings.

Vulnerabilities and Impact

Despite their industry standing, Above All Store Fronts' extensive use of advanced technology and high-quality materials may have made them an attractive target for cybercriminals. The company's reliance on digital systems for project management and client interactions could have exposed vulnerabilities that the Qilin group exploited. The attack not only jeopardizes sensitive client data but also threatens the company's reputation and operational continuity.

Profile of the Qilin Ransomware Group

The Qilin ransomware group is a prominent ransomware-as-a-service (RaaS) entity that emerged in 2022. Known for targeting critical infrastructure and other essential services, Qilin customizes its attacks for each victim, complicating recovery efforts. The ransomware, written in Rust and Go, employs double extortion techniques, exfiltrating sensitive data and demanding ransom for decryption while threatening to release the stolen data.

The ransomware typically infiltrates systems through phishing emails containing malicious links, followed by lateral movement across the victim's infrastructure to locate and encrypt essential data. The group's sophisticated approach and high payout rates to affiliates make it a formidable threat in the cybersecurity landscape.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.