Ransomware Attack on Cushman Contracting Corporation by 8Base

Incident Date:

May 13, 2024

World map

Overview

Title

Ransomware Attack on Cushman Contracting Corporation by 8Base

Victim

Cushman Contracting Corporation

Attacker

8base

Location

Santa Barbara, USA

California, USA

First Reported

May 13, 2024

Ransomware Attack on Cushman Contracting Corporation by 8Base

Victim Overview

Cushman Contracting Corporation, a general engineering contractor based in Santa Barbara, California, with over 50 years of experience, fell victim to a cyberattack orchestrated by the ransomware group 8Base. The company has a diverse client base, including federal, state, county, city, special district, and private entities. They specialize in commercial and residential construction projects, offering services such as general contracting, construction management, design-build services, and renovation project, generating a company revenue of $9.5 million.

Standout in the Industry

The corporation is known for its quality work and ability to deliver projects under budget. The company has received positive reviews from clients such as the Carpinteria Sanitary District, Ventura Harbor Boatyard, and Mammoth Community Water District.

Victim Vulnerabilities

The company's vulnerabilities in being targeted by threat actors include the exposure of sensitive information such as invoices, receipts, accounting documents, personal data, certificates, employment contracts, and more. The leaked data, fully published by the attackers, indicates a significant breach of security.

Attack Overview

The cybercrime group 8Base utilized ransomware as their attack method to compromise Cushman Contracting Corporation's website. The attack led to the exposure of various types of confidential data, highlighting the critical importance of implementing robust cybersecurity measures to mitigate such threats.

Ransomware Group 8Base

The 8Base ransomware group has gained notoriety for its aggressive tactics, primarily targeting small and medium-sized businesses across various sectors. They are known for their double-extortion tactics, where they encrypt a victim's files and threaten to publicly release stolen data if the ransom is not paid. The group uses ransomware strains like Phobos and spreads via phishing emails, exploit kits, and drive-by downloads.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.