One of the affiliates for the LockBit 3.0 RaaS hit the Japanese tech company Oomiya. Oomiya is focused on designing and manufacturing microelectronics and facility system equipment.
The business of Omiya Kasei is divided into four major areas, manufacturing and designing chemical and industrial products, designing electronic materials, pharmaceutical development, and factory manufacturing.
Lockbit 3.0 operators claim to have stolen data from the company and threaten to leak it by October 20, 2022 if the company will not pay the ransom. At this time, the ransomware gang has yet to publish samples of the alleged stolen documents.
This incident could have a significant impact of third party organizations because Oomiya is in the supply chain of major organizations worldwide in multiple industries, including manufacturing, semiconductors, automotive, communications, and healthcare.
The Lockbit affiliates are the most active in this period, bolows data shared by DarkFeed that demonstrates the malware has hit hundreds of organizations.
— DarkFeed (@ido_cohen2) October 3, 2022
DarkFeed #Ransomware Groups Statistics September 2022:
– Lockbit: 103
– Black Basta: 17
– BlackCat: 17
– Avos Locker: 16
– Hiveleaks: 14
– Sparta: 13
– BlackByte: 6
– Vice: 6
Total Victims: 230(Aug 165)
Lockbit is leading with 1157 victims
Hive: 192
BlackCat: 177pic.twitter.com/B8d8EDjpat
— DarkFeed (@ido_cohen2) October 14, 2022
Lockbit #Ransomware team just added Six
new victims
One of the victims is The Tamash company which specializes in the development, production, and marketing of electrical cabinets and various metal products from Israel#Lockbit pic.twitter.com/yc2cofrrIJ
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Oomiya)
[adrotate banner=”5″]
[adrotate banner=”13″]