Ransomware Attack Hits MBL Architects, Lynx Group Demands $5M

Incident Date:

August 7, 2024

World map

Overview

Title

Ransomware Attack Hits MBL Architects, Lynx Group Demands $5M

Victim

Miller Boskus Lack Architects

Attacker

Lynx

Location

Fayetteville, USA

Arkansas, USA

First Reported

August 7, 2024

Ransomware Attack on Miller Boskus Lack Architects by Lynx Group

Miller Boskus Lack Architects (MBL Architects), a multidisciplinary architectural firm based in Fayetteville, Arkansas, has recently fallen victim to a ransomware attack orchestrated by the notorious Lynx group. The attack was discovered on August 8, 2024, and has raised significant concerns regarding the firm's operational integrity and client trust.

About Miller Boskus Lack Architects

MBL Architects specializes in architecture, urban design, planning, and development consulting. The firm is known for its commitment to sustainable design principles and advanced building information modeling (BIM). With a small team of 10 to 19 employees and an estimated annual revenue of less than $5 million, MBL Architects has established a reputation for delivering award-winning designs and engaging in community-focused projects. Notable works include the University of Arkansas Library Storage and various civic structures.

Attack Overview

The ransomware attack on MBL Architects was publicly claimed by the Lynx group via their dark web leak site. The attackers have demanded a ransom of $5,000,000, threatening to leak sensitive data if their demands are not met. The compromised data has been categorized under "Income," and the publication has garnered an unspecified number of views. The firm's website, mbl-arch.com, was specifically targeted, although the full extent of the data breach remains unknown.

About the Lynx Ransomware Group

Lynx is a sophisticated ransomware variant that encrypts files on infected systems, appending the ".LYNX" extension to each one. The group employs a double extortion tactic, threatening to leak stolen data if the ransom is not paid. Lynx typically spreads through phishing emails and malicious downloads, utilizing advanced encryption algorithms that make file recovery nearly impossible without the decryption key. The group is believed to be part of a larger, organized ransomware-as-a-service operation, employing professional-grade tools and methods.

Vulnerabilities and Penetration

MBL Architects' modest size and limited resources may have made them an attractive target for the Lynx group. Smaller firms often lack the cybersecurity measures that larger organizations can afford, making them more vulnerable to sophisticated attacks. The exact method of penetration remains unclear, but it is likely that the attackers exploited vulnerabilities through phishing emails or malicious downloads, common vectors for ransomware distribution.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.