Hit Them When They're Down: Two Cyberattacks Leave Operations Halted with a Ransom to Pay

ransom attackA recent cyberattack on Australian beverage manufacturer Lion demonstrates how even a modicum of precaution after an attack can spell doom for operations.

Earlier this month, it was reported that Lion suffered a cyberattack that resulted in every IT system being shut down. While no details were provided at the time, it was later revealed that a second attack occurred. Despite initial efforts to beef up security on systems during the remediation efforts of the first attack, the second attack resulted in data being stolen along with a ransom demand that included the threat of publishing or auctioning off Lion’s stolen data.

According to another report, the attack was identified as using REvil ransomware, with the cybercriminal group extorting Lion to pay a ransom of $800,000. We’ve said before that all ransomware attacks must be treated as data breaches – even if there’s no initial evidence of a breach.

The Lion attack seems to be the “new normal” when it comes to ransomware attacks with many ransomware operators getting on the extortion bandwagon looking to ensure they receive payment.

Lion’s story isn’t unique; in fact, it represented everything you should expect moving forward.

So, organizations can no longer simply rely on backups to address the issue of encrypted data; instead a proactive security stance needs to be propped up that includes Security Awareness Training to prevent ransomware attacks from happening in the first place.

Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 23 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews