• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security Intruders Latest Cybersecurity News

Edward Don falls victim to a ransomware attack

John Greenwood Posted On June 11, 2021
0



Edward Don Ransomware Attack

Edward Don is one of the leading food service equipment distributor in the United States, who supplies kitchen related utensils. Earlier this week, Edward don has become a victim to ransomware attack and it has obstructed its normal operations affecting its phone, email and other network systems.

Also, because of this incident the firm has shutdown portion of its distribution network to keep things intact and fix things. It also came just after that Edward Don celebrating its 100 years of service in the industry last month.

It is also believed that the employees were forced to switch to Gmail for their communications with their clients. Edward Don has disclosed the attack as per the norms and its operational hindrance will cause massive after effects on restaurants, hotels, bars and hospital.

Ransomware behind the attack 

It is suspected that Qbot mlware could be the one behind the attack on Edward Don, as per Vitali Kremez, CEO of Advanced Intel. Ransomware groups are seem to partner with Qbot, as the latter helps in gaining remote access into corporate networks. The malware helps in lateral movement within the network and later drops the ransomware after successfully distributing itself. Qbot has seen partnering with Egregor ransomware group, and later REvil ransomware operators are found using this malware for their attack.

The Cybersecurity Times is monitoring the news, and will update once further details on the attack are revealed.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

Share the article with your friends


CyberattackData BreachEdward Don CyberattackEdward Don ransomwareEdward Don Ransomware AttackRansomware attack on Edward Don


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

You may also like
Russian Hackers APT29 Exploits WinRAR Vulnerability
November 18, 2023
LockBit Ransomware Group Exposes Boeing: 43GB of Stolen Data Released
November 12, 2023
Israel Hamas Cyberattack: A Closer Look at Ongoing Cyber Warfare
October 17, 2023
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search