LockBit Ransomware Strikes Kentucky's Crisis Center

Incident Date: Jul 02, 2024

Attack Overview
VICTIM
Merryman House Domestic Crisis Center
INDUSTRY
Healthcare Services
LOCATION
USA
ATTACKER
Lockbit
FIRST REPORTED
July 2, 2024

Analysis of the LockBit Ransomware Attack on Merryman House Domestic Crisis Center

Overview of Merryman House Domestic Crisis Center

Merryman House Domestic Crisis Center, a pivotal institution in Kentucky, is dedicated to providing comprehensive support to victims of domestic violence. As a non-profit organization, it serves a crucial role in the community by offering emergency shelter, counseling, legal advocacy, and economic empowerment programs. The center operates a 36-bed facility and extends its services across multiple counties, making it a significant player in the healthcare services sector focused on domestic crisis management.

Details of the Ransomware Attack

On July 3, 2024, Merryman House became a target of the ransomware group LockBit. The specifics of the data compromised during this incident have not been fully disclosed, but the attack was publicized through LockBit3's dark web leak site, indicating a serious security breach. The attack on such a sensitive and critical institution underscores the vulnerability of non-profit organizations that handle substantial personal and sensitive data.

Profile of LockBit Ransomware Group

LockBit, known for its aggressive and sophisticated ransomware campaigns, has been notably active since its emergence in 2019. This group operates on a ransomware-as-a-service model, making it particularly prolific and dangerous. LockBit is distinguished by its use of advanced encryption methods and its strategy of double extortion, where they not only encrypt the victim's data but also threaten to release it publicly if their ransom demands are not met. Their targeting mechanisms often exploit vulnerabilities such as those found in Remote Desktop Protocol (RDP) services and unsecured network shares.

Potential Vulnerabilities and Entry Points

The specific vector used by LockBit to infiltrate Merryman House's network has not been publicly disclosed. However, common entry points for such attacks include phishing, exploitation of unpatched software vulnerabilities, and compromised credentials. Given the extensive services and sensitive nature of the data handled by Merryman House, it is plausible that multiple entry points could have been exploited. The organization's significant reliance on digital records for client management and support could have made it an attractive target for LockBit, aiming to leverage the critical nature of the data for a higher likelihood of ransom payment.

Sources

Disclaimer

The Halcyon Attacks Lookout Database is compiled using publicly available information based on the hosting choices of real-world threat actors and data from a variety of trackers. This information is provided in accordance with principles of fair use. Halcyon has made reasonable efforts to sanitize and verify the data; however, we do not guarantee the accuracy, completeness, or reliability of the information provided. Updates to the database are made as new source data becomes available from reputable sources.  By accessing, viewing, or using the information within the Halcyon Attacks Lookout Database, you acknowledge and agree to do so entirely at your own risk. No reliance should be placed upon the information for decision-making, and Halcyon disclaims all liability for any inaccuracies or omissions in the data.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.