Article Details
Scrape Timestamp (UTC): 2024-08-20 22:48:24.086
Original Article Text
Click to Toggle View
CannonDesign confirms Avos Locker ransomware data breach. The Cannon Corporation dba CannonDesign is sending notices of a data breach to more than 13,000 of its clients, informing that hackers breached and stole data from its network in an attack in early 2023. CannonDesign is a multi-awarded architectural, engineering, and consulting firm based in the United States, recognized for its work on high-profile projects such as academic buildings, hospitals, and sports arenas. The company, ranked one of the most innovative innovative architecture firms in the world, has been involved in major projects like the University of Minnesota Health Clinics and Surgery Center, and the multi-purpose stadium at the University of Maryland. The notification letter that CannonDesign started sending to impacted individuals informs of a security incident that occurred between January 19-25, 2023, which involved unauthorized network access and data exfiltration. Although the firm discovered the breach on January 25, 2023, the investigation into the incident was only completed on May 3, 2024, and it took them another three months. The investigation revealed that the threat actor behind the attack might have accessed names, addresses, social security numbers (SSNs), and driver’s license numbers. Notification recipients are offered 24-month credit monitoring through Experian to mitigate the risk that stems from their personal data exposure, though it should be noted that this comes with a significant delay. Avos Locker attack Even though Cannon Design has not named the cybercriminals responsible for the attack, a spokesperson confirmed to BleepingComputer that the disclosure relates to the Avos Locker ransomware attack that occured early in 2023. Also, the firm states that it is not aware of any attempted misuse of the stolen information, although the data has been published online multiple times and on various sites. On February 2, 2023, the Avos Locker ransomware gang announced a breach on CannonDesign, claiming to hold 5.7 TB of stolen data, including corporate and client files. After the threat actor’s presumably failed to extort the architectural firm, the baton was passed to Dunghill Leaks, which published 2TB of data stolen from CannonDesign on September 26, 2023. The data allegedly included database dumps, project schematics, hiring documents, client details, marketing material, IT and infrastructure details, and quality assurance reports. Dunghill Leaks is a data leak site launched by the Dark Angels ransomware group in April 2023 and used to pressure victims into paying the ransomware demand. In February 2024, the same dataset was published on hacker forums in the dark web, including ClubHydra, while one part of the dataset was shared via torrent on Breached Forums in July 2024. BleepingComputer has contacted CannonDesign to confirm that the disclosed data breach is linked to the same dataset that has been circulated online for over a year now, but a comment wasn’t immediately available.
Daily Brief Summary
CannonDesign, a top architecture and engineering firm in the U.S., reported a data breach affecting over 13,000 clients due to a ransomware attack by Avos Locker in early 2023.
Hackers accessed and extracted sensitive data, including names, social security numbers, and driver's license numbers, during the breach that occurred between January 19-25, 2023.
Although the breach was detected on January 25, 2023, the full investigation was not completed until May 3, 2024, with further delays in public notification.
Victims of the breach were offered 24 months of free credit monitoring through Experian, though there was a significant delay in this offering.
The Avos Locker ransomware group claimed they had stolen 5.7 TB of data from CannonDesign, later passing some of it to Dunghill Leaks, which published 2 TB of the data.
No misuse of the stolen data has been reported, although it has been circulated multiple times on various online platforms including dark web forums and torrent sites.
The leaked data included comprehensive project details, client information, and internal documents, causing potential reputational and operational risks for CannonDesign.