Qilin Ransomware Strikes Diamond Contracting in Cyber Attack

Incident Date:

September 23, 2024

World map

Overview

Title

Qilin Ransomware Strikes Diamond Contracting in Cyber Attack

Victim

DIamond Contracting, LLC

Attacker

Qilin

Location

Peoria, USA

Arizona, USA

First Reported

September 23, 2024

Qilin Ransomware Group Targets Diamond Contracting LLC

Diamond Contracting LLC, a respected construction company based in Peoria, Arizona, has recently been targeted by a ransomware attack orchestrated by the infamous Qilin group. Known for its extensive range of construction services, Diamond Contracting excels in remodeling, home improvements, and roofing, serving both residential and commercial clients. With over 40 years of combined experience, the company has earned a reputation for quality workmanship and exceptional service.

Company Profile and Vulnerabilities

As a small business, Diamond Contracting has been actively involved in approximately 37 projects over the past year. Despite its size, the company has built a strong reputation, evidenced by its accreditation with the Better Business Bureau and a perfect customer review rating. However, like many small businesses, Diamond Contracting may lack the advanced cybersecurity infrastructure necessary to fend off sophisticated cyber threats, making it a potential target for ransomware groups like Qilin.

Attack Overview

The Qilin ransomware group, operating under a Ransomware-as-a-Service model, has claimed responsibility for the attack on Diamond Contracting. The group is notorious for its double extortion strategy, which involves encrypting the victim's data and exfiltrating sensitive information. This tactic is designed to pressure victims into paying the ransom by threatening to release stolen data publicly. The specifics of the data compromised in this attack have not been disclosed, but the breach highlights the vulnerabilities faced by small businesses in the construction sector.

Qilin Ransomware Group

Qilin, also known as Agenda, has gained notoriety for its sophisticated cyber attacks since its emergence in 2022. The group distinguishes itself by using Rust-based malware, enhancing its evasion capabilities and allowing for attacks across multiple operating systems. Qilin's operations have targeted over 150 organizations in 25 countries, with a focus on sectors such as healthcare, education, and now construction. The group's ability to adapt quickly and effectively target vulnerable organizations makes it a significant threat in the cybersecurity landscape.

Potential Penetration Methods

While the exact method of penetration in the Diamond Contracting attack is not publicly known, Qilin typically gains initial access through phishing emails containing malicious links. Once inside the network, the group exploits vulnerabilities to escalate privileges and exfiltrate data before encryption. This multi-faceted approach allows Qilin to maximize disruption and increase the likelihood of ransom payment.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.