Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fencing and Pet Company Jewett-Cameron Hit by Ransomware

Fencing and Pet Company Jewett-Cameron Hit by Ransomware

Posted on October 22, 2025October 22, 2025 By CWS

Oregon-based fencing and pet options supplier Jewett-Cameron Firm was lately focused in a cyberattack that resulted in disruption and the theft of delicate info. 

Jewett-Cameron makes kennels, crates and different equipment for canines, in addition to fencing, specialty wooden, and gardening merchandise. 

In a Tuesday submitting with the SEC, the corporate revealed that it detected an intrusion into its IT surroundings on October 15. 

The investigation launched into the incident is ongoing, however Jewett-Cameron has decided that the hackers deployed “encryption and monitoring software program” on company IT methods.

The assault has led to disruptions and the corporate being unable to entry some enterprise purposes associated to operations and company features. 

The corporate believes the intrusion has been contained and it’s engaged on restoring impacted methods. There isn’t a proof up to now that the private info of staff, clients, distributors or suppliers has been compromised. 

The hackers seem to have obtained “pictures of video conferences and pc screens which will include delicate firm info”.

“Present evaluation signifies that the information exfiltrated primarily pertains to IT associated info and monetary info the Firm has been gathering and analyzing over the previous few weeks in preparation of submitting with the Securities and Change Fee its Annual Report on Type 10-Ok for the fiscal 12 months ended August 31, 2025, which the Firm expects to launch in mid-November,” Jewett-Cameron defined.Commercial. Scroll to proceed studying.

The corporate stated risk actors have threatened to make public the stolen info except a ransom is paid. 

This temporary description of the incident signifies that Jewett-Cameron has been focused in a double-extortion ransomware assault that concerned the encryption of information and the theft of data. 

It’s unclear which ransomware group is behind the assault. SecurityWeek has not seen any identified risk actor naming Jewett-Cameron on its leak web site.

Jewett-Cameron believes incident response prices might be lined by its cybersecurity insurance coverage coverage, however admits that the disruptions might also lead to materials impression on operations.

Associated: Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Marketing campaign

Associated: SimonMed Imaging Knowledge Breach Impacts 1.2 Million

Associated: Ransomware Group Claims Assault on Beer Big Asahi

Security Week News Tags:Company, Fencing, Hit, JewettCameron, Pet, Ransomware

Post navigation

Previous Post: Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams
Next Post: What Makes a Great Field CXO: Lessons from the Front Lines

Related Posts

Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues Akira Ransomware’s Exploitation of SonicWall Vulnerability Continues Security Week News
Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases Who is Zico Kolter? A Professor Leads OpenAI Safety Panel With Power to Halt Unsafe AI Releases Security Week News
Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Payment System Vendor Took Year+ to Patch Infinite Card Top-Up Hack: Security Firm Security Week News
Cisco Patches Critical Vulnerability in Firewall Management Platform Cisco Patches Critical Vulnerability in Firewall Management Platform Security Week News
In Other News: k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth Security Week News
Pakistan-Linked Cyber Espionage Targets India’s Defense Pakistan-Linked Cyber Espionage Targets India’s Defense Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News