Ransomware Attack Disrupts TJS Inc.'s Zeroshrink Operations

Incident Date:

August 28, 2024

World map

Overview

Title

Ransomware Attack Disrupts TJS Inc.'s Zeroshrink Operations

Victim

Zeroshrink by TJS Inc.

Attacker

Killsec

Location

Denville, USA

New Jersey, USA

First Reported

August 28, 2024

Ransomware Attack on TJS Inc.'s Zeroshrink by Kill Security

Zeroshrink by TJS Inc., a leading provider of POS and RFID solutions for the jewelry industry, has been targeted by the ransomware group Kill Security. The attackers, known as Killsec, claim to have infiltrated TJS Inc.'s systems and exfiltrated sensitive organizational data. This breach has raised significant concerns about data security and operational disruptions within the company.

Overview of TJS Inc. and Zeroshrink

TJS Inc., founded in 1980, is a prominent company known for its innovative solutions in the jewelry industry. The company has evolved into a global manufacturer and supplier of advanced technologies, including RFID systems and point-of-sale (POS) solutions tailored for the diamond and jewelry sectors. Zeroshrink, their flagship product, is an RFID-based inventory management solution designed to minimize shrinkage—loss of inventory due to theft, errors, or mismanagement. This technology allows jewelers to conduct rapid and accurate inventory checks, significantly reducing labor costs and improving operational efficiency.

Details of the Ransomware Attack

The ransomware group Kill Security, also known as Killsec, has claimed responsibility for the attack on TJS Inc. The group has a history of targeting various industries, including government, manufacturing, defense, professional services, banking, and finance. They have been known to demand extortion amounts ranging from 1,500 EUR to 10,000 EUR. In this instance, Killsec claims to have obtained sensitive data from TJS Inc., which could potentially include customer information, financial records, and proprietary technology details.

Vulnerabilities and Penetration Methods

While the specific vulnerabilities exploited in this attack have not been disclosed, it is likely that Killsec used a combination of phishing attacks, exploiting unpatched software vulnerabilities, and leveraging weak security protocols to gain access to TJS Inc.'s systems. The use of sophisticated malware and encryption techniques by Killsec has made it difficult for victims to recover their data without paying the ransom. The group's use of various communication channels and crypto wallets, such as Telegram, Session Messenger, Tox, and Monero (XMR) cryptocurrency, further complicates tracking and mitigating their activities.

Impact on TJS Inc.

The ransomware attack on TJS Inc. has significant implications for the company and its clients. As a provider of critical inventory management solutions for the jewelry industry, any disruption in their services can lead to operational inefficiencies and financial losses for their clients. The breach also poses a risk to the company's reputation and customer trust, which are crucial for maintaining their market position.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.