Trending

HomeBlog
REvil Ransomware Operators Targets A-Throne, an American Based Business of Installing Portable Restrooms and Temporary Fencing

REvil Ransomware Operators Targets A-Throne, an American Based Business of Installing Portable Restrooms and Temporary Fencing

The REvil ransomware operators add another breach to their list. In this instance, they struck A-Throne and downloaded their sensitive and highly confidential documents from the company’s database.

For more than 35 years, A-Throne, a family-owned and operated Certified Small Business has been setting the standard for portable restrooms and temporary fencing for construction sites, social gatherings as well as private and public events in Southern California. A-Throne has built its reputation by providing clean, quality portable products and services. Their professional representatives will find the right solution for your construction and special event needs, make sure it is delivered on time, correctly installed, and serviced. They have a large variety of temporary fencing solutions as well as a huge inventory of portable restrooms and along with that they also offer handwashing systems, holding tanks, containment trays, and cardboard trash boxes. No matter the size of the project or event, A-Throne always provides a solution that works best for its users at a reasonable cost. An A-Throne representative is on call 24 hours a day, 7 days a week should an emergency occur.  

As per now, the ransomware operators have posted a sample of files and data of the company being downloaded by them. As per the Cyble Research Team, this small data leak from the large lot seems to be a warning for the company to accept the terms of the ransomware operators. Unfortunately, if the terms are not being accepted by the A-Throne, then the REvil ransomware operators seem to leak a large lot of sensitive data of the company. The ransomware operators have posted a list of files highly sensitive and confidential files and data of the company. Cyble’s researches have examined this data leak which includes corporate operational data and documents such as employee’s payroll data, client’s credit check forms, company’s order forms, sales data, and many more. Below is the snapshot of the message and the list of files being posted by REvil ransomware operators.

Message being posted by REvil ransomware operators

Client’s Credit Check Application Forms

Client’s Purchase Order Invoice from A-Throne

report-ad-banner

Looking at the rapidly increasing number of cyberattacks, Cyble has come up with the vision to assist the organizations in protecting themselves from cyberattacks. To accomplish its vision, Cyble not only holds the largest data breach monitoring search engine that holds over 40 billion darkweb records but also provides the services which include enabling faster detection of cyber threats via Cyble Vision and providing clear visibility to third-party cyber threats and risks via their Third-Party Cyber Risk Intelligence Platform.

About Cyble:

Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.

Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web, and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading