Ransomware Attack on EHS Partnerships by Qilin Group: Key Insights

Incident Date:

July 25, 2024

World map

Overview

Title

Ransomware Attack on EHS Partnerships by Qilin Group: Key Insights

Victim

EHS Partnerships

Attacker

Qilin

Location

Calgary, Canada

, Canada

First Reported

July 25, 2024

Ransomware Attack on EHS Partnerships by Qilin Group

Overview of EHS Partnerships

EHS Partnerships Ltd. is a professional consulting firm specializing in environmental, health, and safety (EHS) services. Incorporated in 1996 and headquartered in Calgary, Alberta, the company operates additional offices in Edmonton, Winnipeg, Ottawa, and San Jose, California. With a team of over 45 practitioners, including post-graduate scientists, Professional Engineers, and Certified Industrial Hygienists, EHS Partnerships provides tailored services to a diverse range of clients across various sectors, including government, public, and private employers in Canada and the U.S.

The firm is known for its comprehensive approach to addressing occupational health and safety challenges, emphasizing customized solutions that align with clients' unique needs and corporate cultures. Their services include gap analysis, audits, technical testing, program development, and employee training, all designed to enhance workplace safety and compliance.

Details of the Ransomware Attack

On July 26, 2024, EHS Partnerships fell victim to a ransomware attack orchestrated by the Qilin ransomware group. The attack was publicly claimed by Qilin via their dark web leak site. While the exact size of the data leak remains unknown, the incident has raised significant concerns about the potential exposure of confidential client data and the operational disruptions that may follow.

The breach underscores the growing threat of ransomware attacks on organizations that handle sensitive and critical information. Given EHS Partnerships' role in managing environmental, health, and safety responsibilities for various organizations, the potential impact of this attack could be substantial.

Profile of the Qilin Ransomware Group

The Qilin ransomware group, also known as Agenda, is a sophisticated Ransomware-as-a-Service (RaaS) operation believed to be of Russian origin. First appearing in October 2022, Qilin has targeted various organizations, including healthcare providers, automotive companies, and government agencies. The group is named after the mythical Chinese creature, symbolizing its adaptability and cross-platform capabilities.

Qilin employs advanced tactics such as data exfiltration and double extortion to pressure victims into paying ransoms. The group has been particularly active in the healthcare sector, causing significant disruptions to hospitals and medical services. Their ability to cause widespread operational disruptions makes them a formidable threat in the cybersecurity landscape.

Potential Vulnerabilities and Penetration Methods

While the specific vulnerabilities exploited in the EHS Partnerships attack are not publicly disclosed, common penetration methods used by ransomware groups like Qilin include phishing emails, exploiting unpatched software vulnerabilities, and leveraging weak or compromised passwords. Organizations that handle sensitive data, such as EHS Partnerships, are particularly attractive targets due to the potential value of the data they hold and the critical nature of their services.

The attack on EHS Partnerships highlights the importance of robust cybersecurity measures and the need for continuous vigilance against evolving ransomware threats.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.