Sit n Sleep Hit by Lynx Ransomware Attack in Retail Sector

Incident Date:

October 8, 2024

World map

Overview

Title

Sit n Sleep Hit by Lynx Ransomware Attack in Retail Sector

Victim

Sit & Sleep

Attacker

Lynx

Location

Gardena, USA

California, USA

First Reported

October 8, 2024

Ransomware Attack on Sit 'n Sleep by Lynx Group

Sit 'n Sleep, a leading mattress and bedding retailer based in Southern California, has fallen victim to a ransomware attack orchestrated by the Lynx group. This incident highlights the increasing vulnerability of retail businesses to cyber threats, particularly those holding substantial customer and operational data.

Company Profile and Industry Standing

Founded in 1978, Sit 'n Sleep has established itself as a prominent player in the U.S. mattress retail industry. With a reported annual revenue of approximately $95.3 million and a workforce of around 160 employees, the company is recognized for selling more mattresses per store than any other retailer in the country. Sit 'n Sleep's commitment to customer education and personalized service sets it apart in the competitive retail landscape. The company's extensive selection of mattresses and bedding accessories, coupled with its innovative Bed Match Quiz, underscores its dedication to enhancing customer sleep experiences.

Details of the Ransomware Attack

The Lynx ransomware group, known for its Ransomware-as-a-Service model, has claimed responsibility for the attack on Sit 'n Sleep. The group reportedly gained unauthorized access to sensitive data, posing significant risks of data leaks, financial losses, and reputational damage. Lynx employs both single and double extortion tactics, encrypting files and exfiltrating data to pressure victims into paying ransoms. The attack on Sit 'n Sleep underscores the growing threat of ransomware in the retail sector, where vast amounts of sensitive data are often stored.

About the Lynx Ransomware Group

Lynx ransomware, a rebranding of the INC ransomware, emerged in 2024 and has targeted over 22 organizations, primarily in the manufacturing and construction industries. The group distinguishes itself by avoiding attacks on government, healthcare, and non-profit organizations, although its operations aim to cause maximum disruption. Lynx primarily targets Windows systems, using phishing and malicious downloads as entry points. The group's data leak site on TOR is used to publicly pressure victims who refuse to comply with ransom demands.

Potential Vulnerabilities and Penetration Methods

Retailers like Sit 'n Sleep are attractive targets for ransomware groups due to their extensive customer databases and operational data. The Lynx group likely penetrated Sit 'n Sleep's systems through phishing or malicious downloads, exploiting potential vulnerabilities in the company's cybersecurity infrastructure. This incident serves as a stark reminder of the need for effective cybersecurity measures in the retail sector to protect against evolving cyber threats.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.