Qilin Ransomware Strikes Canstar Restorations in Cyber Attack

Incident Date:

September 30, 2024

World map

Overview

Title

Qilin Ransomware Strikes Canstar Restorations in Cyber Attack

Victim

Canstar Restorations

Attacker

Qilin

Location

Coquitlam, Canada

, Canada

First Reported

September 30, 2024

Qilin Ransomware Group Targets Canstar Restorations in Major Cyber Attack

Canstar Restorations, a leading Canadian property restoration company, has become the latest victim of a ransomware attack by the notorious Qilin group. The attack, which reportedly resulted in the exfiltration of 287 GB of sensitive data, highlights the growing threat of ransomware to businesses in the consumer services sector.

About Canstar Restorations

Founded in 1985 and headquartered in Coquitlam, British Columbia, Canstar Restorations has established itself as a prominent player in the property restoration industry. The company operates multiple offices across Western Canada, including Alberta and Saskatchewan, employing over 400 professionals. Canstar specializes in fire, water, storm, and mold remediation, as well as hazardous material removal. Their commitment to customer service and community involvement, such as their partnership with the BC SPCA, sets them apart in the industry.

Attack Overview

The Qilin ransomware group, known for its sophisticated cyber attacks, claimed responsibility for the breach. They have posted sample screenshots of the stolen data on their dark web portal, substantiating their claims. The attack on Canstar Restorations underscores the vulnerabilities that even well-established companies face in the digital age. The company's extensive operations and reliance on digital systems for managing restoration projects may have made it an attractive target for cybercriminals.

Qilin Ransomware Group

Qilin, also known as Agenda, operates under a Ransomware-as-a-Service model, providing affiliates with tools to conduct ransomware operations. The group has gained notoriety for its use of Rust-based malware, which enhances its evasion capabilities. Qilin employs a double extortion strategy, encrypting data and threatening to release it unless a ransom is paid. Their attacks have targeted over 150 organizations in 25 countries, affecting sectors such as healthcare and education.

Potential Vulnerabilities

While specific details of how Qilin penetrated Canstar's systems remain undisclosed, common vulnerabilities exploited by ransomware groups include phishing emails and unpatched software. Canstar's extensive digital infrastructure, necessary for coordinating its widespread operations, may have presented opportunities for cybercriminals to gain access. The attack serves as a stark reminder of the importance of effective cybersecurity measures for companies of all sizes.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.