LockBit3 Ransomware Hits Manncorp Inc., Compromising Critical Data

Incident Date: Jun 12, 2024

Attack Overview
VICTIM
Manncorp Inc.
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
Lockbit
FIRST REPORTED
June 12, 2024

LockBit3 Ransomware Attack on Manncorp Inc.

Overview of Manncorp Inc.

Manncorp Inc., a family-owned company founded in 1967, specializes in providing equipment and solutions for the electronics manufacturing industry. Headquartered in Hatboro, Pennsylvania, with an additional facility in San Diego, California, Manncorp operates out of a 35,000 square foot state-of-the-art manufacturing facility. The company offers a wide range of products and services designed to support the production of printed circuit boards (PCBs) and other electronic components. Their offerings include surface mount technology (SMT) equipment, through-hole technology (THT) equipment, and various auxiliary tools and materials essential for electronics assembly.

Details of the Ransomware Attack

On a recent occasion, Manncorp Inc. fell victim to a ransomware attack orchestrated by the notorious LockBit3 group. The attack compromised critical data, including finance data, all QuickBooks data, HR records, and KeePass with all passwords. This breach has significant implications for Manncorp, given their role in the electronics manufacturing supply chain.

About LockBit3 Ransomware Group

LockBit3 is a highly sophisticated ransomware group known for its targeted attacks on corporate and organizational networks. The group employs advanced techniques such as spear-phishing campaigns and exploiting vulnerabilities like CVE-2023-3519 in Citrix NetScaler. LockBit3's modus operandi involves double extortion, where they not only encrypt data but also steal it, threatening to release it publicly to increase pressure on victims to comply with ransom demands.

Potential Vulnerabilities and Penetration Methods

Manncorp's extensive use of digital tools and systems for managing finance, HR, and operational data made them a lucrative target for LockBit3. The ransomware group likely penetrated Manncorp's systems through spear-phishing emails or by exploiting known vulnerabilities in their network infrastructure. The compromised QuickBooks data and KeePass passwords indicate that the attackers had significant access to sensitive information, which could have been facilitated by inadequate cybersecurity measures or unpatched software vulnerabilities.

Sources

Disclaimer

The Halcyon Attacks Lookout Database is compiled using publicly available information based on the hosting choices of real-world threat actors and data from a variety of trackers. This information is provided in accordance with principles of fair use. Halcyon has made reasonable efforts to sanitize and verify the data; however, we do not guarantee the accuracy, completeness, or reliability of the information provided. Updates to the database are made as new source data becomes available from reputable sources.  By accessing, viewing, or using the information within the Halcyon Attacks Lookout Database, you acknowledge and agree to do so entirely at your own risk. No reliance should be placed upon the information for decision-making, and Halcyon disclaims all liability for any inaccuracies or omissions in the data.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.