06-11-2024, 07:05 AM
News Cyberattack on ControlNET: INC Ransom Group Claims Breach of Building Technolog
<p><img width="1000" height="667" src="https://thecyberexpress.com/wp-content/uploads/ControlNET-cyberattack-1.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ControlNET cyberattack" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/ControlNET-cyberattack-1.webp 1000w, https://thecyberexpress.com/wp-content/u...0x200.webp 300w, https://thecyberexpress.com/wp-content/u...8x512.webp 768w, https://thecyberexpress.com/wp-content/u...0x400.webp 600w, https://thecyberexpress.com/wp-content/u...0x100.webp 150w, https://thecyberexpress.com/wp-content/u...0x500.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><span style="font-weight: 400;">INC Ransom group has targeted the building technology solutions provider, ControlNET LLC. The ControlNET cyberattack on June 10, 2024, allegedly targeted the supply chain factor of the organization and also asserted intrusion on Rockford Public Schools.</span>
<span style="font-weight: 400;">ControlNET, renowned for its expertise in HVAC, lighting, video surveillance, access control, and power solutions, is now facing an alleged attack by a hacker group. </span>
<span style="font-weight: 400;">In its post, the group not only infiltrated ControlNET's systems but also exposed sensitive information, including invoice details, building floor plans, email communications, and sample folders of ControlNET and their clientele.</span>
<h3><span style="font-weight: 400;">Understanding the ControlNET Cyberattack</span></h3>
<span style="font-weight: 400;">The ramifications of this breach extend beyond ControlNET with operations disrupted and <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" title="data" data-wpil-keyword-link="linked" data-wpil-monitor-id="5004">data</a> compromised for the organization. However, the claims for this <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-cyber-attack/" target="_blank" rel="noopener" title="cyberattack" data-wpil-keyword-link="linked" data-wpil-monitor-id="5005">cyberattack</a> on ControlNET have not been verified. The hacker group’s post on the <a href="https://en.wikipedia.org/wiki/Dark_web" target="_blank" rel="nofollow noopener">dark web</a> shed light on their motives, citing ControlNET's alleged negligence in safeguarding customer data. </span>
[caption id="attachment_76431" align="alignnone" width="1357"]<img class="size-full wp-image-76431" src="https://thecyberexpress.com/wp-content/uploads/ControlNET-Cyberattack.webp" alt="ControlNET Cyberattack" width="1357" height="222" /> Source: <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-the-dark-web/" target="_blank" rel="noopener" title="Dark Web" data-wpil-keyword-link="linked" data-wpil-monitor-id="5003">Dark Web</a>[/caption]
<span style="font-weight: 400;">“This company has taken very poor care of the data entrusted to them by its customers. In the course of a successful attack, we stole a huge amount of data. We also attacked the clients of this company ROCKFORD SCHOOL. Which we have access to thanks to CONTROL NET”, reads the threat actor post. </span>
<span style="font-weight: 400;">The leaked information highlights the urgent need for enhanced <a href="https://thecyberexpress.com/mandatory-dark-web-monitoring-sebi/" target="_blank" rel="noopener">cybersecurity measures</a>, particularly in industries like construction and education, where sensitive data is at stake.</span>
<h3><span style="font-weight: 400;">Who is the INC Ransom Hacker Group?</span></h3>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to the organization to learn more about this ControlNET cyberattack and the authenticity of the claims made by the threat actor. However, at the time of writing this, no official statement or response has been received, leaving the claims for the cyberattack on ControlNET unverified. </span>
<span style="font-weight: 400;">Moreover, the company's website appears to be operational, suggesting that the attack may have targeted the backend infrastructure rather than the front-end interface. The threat actor in this attack, <a href="https://thecyberexpress.com/inc-ransomware-group-target-7-new-victims/" target="_blank" rel="noopener">INC Ransom</a>, is a ransomware group that emerged in August 2023, employing double and triple extortion tactics on victims, leaking data on their blog. </span>
<span style="font-weight: 400;">Victims, mainly from Western countries, face threats and coercion during negotiations, with evidence packs published to pressure payment. The group's leaked blog includes light and dark UI options, a feedback box, and a Twitter link. </span>
<span style="font-weight: 400;">While similar to LockBit 3.0's blog, INC Ransom does not charge for leaked data. Victims, spanning private sector businesses, a government organization, and a charity association, hail mostly from the United States and Europe, emphasizing the widespread impact of this <a href="https://thecyberexpress.com/web-stories/nba-finals/" target="_blank" rel="noopener">cyber threat</a>.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/inc-ransom-c...berattack/
<p><img width="1000" height="667" src="https://thecyberexpress.com/wp-content/uploads/ControlNET-cyberattack-1.webp" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="ControlNET cyberattack" decoding="async" srcset="https://thecyberexpress.com/wp-content/uploads/ControlNET-cyberattack-1.webp 1000w, https://thecyberexpress.com/wp-content/u...0x200.webp 300w, https://thecyberexpress.com/wp-content/u...8x512.webp 768w, https://thecyberexpress.com/wp-content/u...0x400.webp 600w, https://thecyberexpress.com/wp-content/u...0x100.webp 150w, https://thecyberexpress.com/wp-content/u...0x500.webp 750w" sizes="(max-width: 1000px) 100vw, 1000px" /></p><span style="font-weight: 400;">INC Ransom group has targeted the building technology solutions provider, ControlNET LLC. The ControlNET cyberattack on June 10, 2024, allegedly targeted the supply chain factor of the organization and also asserted intrusion on Rockford Public Schools.</span>
<span style="font-weight: 400;">ControlNET, renowned for its expertise in HVAC, lighting, video surveillance, access control, and power solutions, is now facing an alleged attack by a hacker group. </span>
<span style="font-weight: 400;">In its post, the group not only infiltrated ControlNET's systems but also exposed sensitive information, including invoice details, building floor plans, email communications, and sample folders of ControlNET and their clientele.</span>
<h3><span style="font-weight: 400;">Understanding the ControlNET Cyberattack</span></h3>
<span style="font-weight: 400;">The ramifications of this breach extend beyond ControlNET with operations disrupted and <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-data/" target="_blank" rel="noopener" title="data" data-wpil-keyword-link="linked" data-wpil-monitor-id="5004">data</a> compromised for the organization. However, the claims for this <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-a-cyber-attack/" target="_blank" rel="noopener" title="cyberattack" data-wpil-keyword-link="linked" data-wpil-monitor-id="5005">cyberattack</a> on ControlNET have not been verified. The hacker group’s post on the <a href="https://en.wikipedia.org/wiki/Dark_web" target="_blank" rel="nofollow noopener">dark web</a> shed light on their motives, citing ControlNET's alleged negligence in safeguarding customer data. </span>
[caption id="attachment_76431" align="alignnone" width="1357"]<img class="size-full wp-image-76431" src="https://thecyberexpress.com/wp-content/uploads/ControlNET-Cyberattack.webp" alt="ControlNET Cyberattack" width="1357" height="222" /> Source: <a class="wpil_keyword_link" href="https://thecyberexpress.com/what-is-the-dark-web/" target="_blank" rel="noopener" title="Dark Web" data-wpil-keyword-link="linked" data-wpil-monitor-id="5003">Dark Web</a>[/caption]
<span style="font-weight: 400;">“This company has taken very poor care of the data entrusted to them by its customers. In the course of a successful attack, we stole a huge amount of data. We also attacked the clients of this company ROCKFORD SCHOOL. Which we have access to thanks to CONTROL NET”, reads the threat actor post. </span>
<span style="font-weight: 400;">The leaked information highlights the urgent need for enhanced <a href="https://thecyberexpress.com/mandatory-dark-web-monitoring-sebi/" target="_blank" rel="noopener">cybersecurity measures</a>, particularly in industries like construction and education, where sensitive data is at stake.</span>
<h3><span style="font-weight: 400;">Who is the INC Ransom Hacker Group?</span></h3>
<span style="font-weight: 400;"><a href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> has reached out to the organization to learn more about this ControlNET cyberattack and the authenticity of the claims made by the threat actor. However, at the time of writing this, no official statement or response has been received, leaving the claims for the cyberattack on ControlNET unverified. </span>
<span style="font-weight: 400;">Moreover, the company's website appears to be operational, suggesting that the attack may have targeted the backend infrastructure rather than the front-end interface. The threat actor in this attack, <a href="https://thecyberexpress.com/inc-ransomware-group-target-7-new-victims/" target="_blank" rel="noopener">INC Ransom</a>, is a ransomware group that emerged in August 2023, employing double and triple extortion tactics on victims, leaking data on their blog. </span>
<span style="font-weight: 400;">Victims, mainly from Western countries, face threats and coercion during negotiations, with evidence packs published to pressure payment. The group's leaked blog includes light and dark UI options, a feedback box, and a Twitter link. </span>
<span style="font-weight: 400;">While similar to LockBit 3.0's blog, INC Ransom does not charge for leaked data. Victims, spanning private sector businesses, a government organization, and a charity association, hail mostly from the United States and Europe, emphasizing the widespread impact of this <a href="https://thecyberexpress.com/web-stories/nba-finals/" target="_blank" rel="noopener">cyber threat</a>.</span>
<span style="color: #ff0000;"><i><span style="font-weight: 400;">Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. <a style="color: #ff0000;" href="https://thecyberexpress.com/" target="_blank" rel="noopener">The Cyber Express</a> assumes no liability for the accuracy or consequences of using this information.</span></i></span>
https://thecyberexpress.com/inc-ransom-c...berattack/