DragonForce Cyberattack Hits Two More: Westward360 And CLS


The DragonForce ransomware group has expanded its list of victims, adding two new entities, Westward360 and Compression Leasing Services, to their dark web portal.

The DragonForce cyberattack targets two American companies, yet details regarding data compromise and the motive behind the attack remain undisclosed by the hackers.

DragonForce Cyberattack: Two New Targets

What adds complexity to the situation is the accessibility of the official websites of the targeted companies. Despite the reported DragonForce cyberattack, the websites remain fully operational.

This raises suspicions about the attackers’ intentions—whether it’s a strategic move to gain attention or if there’s a deeper motive at play.

Clarity on the DragonForce cyberattack can only emerge once official statements are released by the affected organizations.

Source: Twitter
DragonForce Cyberattack
Source: Twitter

The targeting of companies like Westward360 and Compression Leasing Services, which likely hold significant volumes of sensitive data and play crucial roles in their respective sectors, could exacerbate the ramifications of the DragonForce cyberattack.

The potential compromise of sensitive financial, operational, or customer data within these organizations could lead to severe disruptions in their operations, financial losses, damage to reputation, and legal repercussions.

Moreover, if the DragonForce cyberattack results in data breaches involving personally identifiable information (PII) or confidential business data, it could pose serious privacy and security risks for individuals and businesses associated with the targeted companies, potentially leading to identity theft, fraud, and other malicious activities.

Previous DragonForce cyberattack Claims

Meanwhile, the Ohio Lottery has recently confirmed a cybersecurity incident that occurred in December, shedding light on the Ohio Lottery data breach.

The breach, which occurred on December 24, involved unauthorized access to both customer and retailer data. The Lottery has attributed the attack to a ransomware group, acknowledging significant data theft.

Following the cyberattack, the Ohio Lottery faced operational challenges, impacting its mobile cashing app and Super Retailer outlets’ ability to process online prize claims exceeding $599.

While prizes up to $599 can still be redeemed at retail outlets, those above $600 require mailing to the Ohio Lottery Central Office for processing—a measure imposed due to the breach’s aftermath.

DragonForce, the same ransomware group implicated in the Ohio Lottery attack, claimed responsibility for the breach on December 27, boasting of stealing over 600 GB of data.

The stolen data reportedly includes sensitive information such as names, addresses, winnings, dates of birth, and social security numbers, affecting both employees and players alike.

In a parallel incident, Yakult Australia has also fallen victim to a cybersecurity breach, further highlighting the pervasive threat of cyberattacks. The breach, which occurred in mid-December, has thrown the Australia and New Zealand divisions of Yakult into disarray during a critical time of the year.

DragonForce’s involvement in the Yakult Australia breach was revealed through a threat posted on its onion leak site on December 20. The post outlined the breach, indicating the compromise of 95.19 GB of data, including the company database, contracts, passports, and more.

These incidents highlight the escalating threat posed by ransomware groups like DragonForce, targeting organizations worldwide with devastating consequences.

As cyber adversaries continue to evolve their tactics, collaboration between governments, organizations, and cybersecurity experts is essential to combatting cyber threats and safeguarding digital infrastructure and sensitive information. Only through collective efforts and heightened vigilance can the global community effectively thwart cybercriminals and ensure a secure digital environment for all.

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.





Source link