Ransomware Hits Zon Beachside LLC: Dispossessor Group's Latest Target

Incident Date:

August 5, 2024

World map

Overview

Title

Ransomware Hits Zon Beachside LLC: Dispossessor Group's Latest Target

Victim

Zon Beachside LLC

Attacker

Dispossessor

Location

Indian Harbour Beach, USA

Florida, USA

First Reported

August 5, 2024

Ransomware Attack on Zon Beachside LLC by Dispossessor Group

Zon Beachside LLC, a healthcare company specializing in assisted living and memory care facilities, has recently fallen victim to a ransomware attack orchestrated by the Dispossessor group. The attack was publicly disclosed on Dispossessor's dark web leak site, indicating a successful breach of Zon Beachside's systems.

About Zon Beachside LLC

Zon Beachside LLC operates in Indian Harbour Beach, Florida, providing high-quality care and support for its residents. The company is dedicated to enhancing the quality of life for its residents through personalized care programs and state-of-the-art facilities. Their guiding philosophy, Hands with Heart℠, emphasizes the importance of allowing residents to live their lives as they choose while receiving the highest level of care and attention.

Central to Zon Beachside's offerings is the Zon360 program, a personalized initiative that addresses various essential areas of life enhancement. This program promotes holistic well-being through tailored activities and support services. Additionally, Zon Beachside offers unique services like ZonHealth, which includes passive resident monitoring, and ZonConnect, a web portal for residents to connect with family and concierge services.

With approximately 15 staff members and an estimated revenue of $21.6 million, Zon Beachside is a significant player in the assisted living and memory care sector in the region.

Attack Overview

The ransomware attack on Zon Beachside was claimed by the Dispossessor group, which has listed the company among its targets on their dark web leak site. The extent of the attack and the specific demands made by the Dispossessor group remain undisclosed at this time. However, the public listing indicates a successful breach, raising concerns about the potential exposure of sensitive resident data and operational disruptions.

About Dispossessor Ransomware Group

Dispossessor is a relatively new player in the ransomware scene, emerging after a significant crackdown on the notorious LockBit group. The group closely resembles LockBit in terms of structure and content, suggesting either a rebranding effort by the same operators or a new group leveraging LockBit’s infrastructure.

Dispossessor operates under the Ransomware-as-a-Service (RaaS) model, allowing affiliates to distribute ransomware and execute attacks on various targets. Unlike typical ransomware groups, Dispossessor primarily functions as data brokers, publishing data leaks from other groups, including defunct ones. This opportunistic approach positions them as data brokers rather than a traditional ransomware group.

Potential Vulnerabilities

Zon Beachside's reliance on state-of-the-art facilities and technology, while beneficial for resident care, may also present vulnerabilities that threat actors can exploit. The integration of advanced monitoring systems and web portals could be potential entry points for cybercriminals. Ensuring robust cybersecurity measures and regular system audits are crucial for protecting sensitive data and maintaining operational integrity.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.