Jewett-Cameron, an Oregon-based manufacturer of pet, garden, and fencing products, has disclosed it was the victim of a ransomware attack on October 15, 2025. In a Form 8-K filing with the U.S. Securities and Exchange Commission, the company confirmed the incident caused operational disruptions due to the deployment of encryption software. The attackers also exfiltrated sensitive corporate data, most notably financial information being compiled for the company's annual Form 10-K filing. The threat actors have made a ransom demand and are threatening to release the stolen data. The incident highlights the growing trend of ransomware groups targeting non-public financial information for additional leverage.
Attackers gained unauthorized access to the company's network, deploying 'encryption and monitoring software.' This led to a temporary loss of access to corporate and operational applications. While the company stated there is no evidence that customer or employee PII was exposed, the attackers successfully stole sensitive internal data.
The attackers' TTPs included:
T1486): The core of the attack involved encrypting corporate systems, disrupting business operations.T1530): The attackers specifically targeted and exfiltrated financial data being staged for the company's Form 10-K filing. This is a highly targeted form of data collection.T1113): The theft of 'video meeting screen captures' indicates the use of spyware or monitoring tools to capture sensitive discussions or displayed information.Targeting pre-release financial data is a powerful extortion tactic. Leaking this information before the official filing could violate fair disclosure regulations, manipulate stock prices, and cause significant legal and regulatory problems for a publicly traded company like Jewett-Cameron.
No specific Indicators of Compromise (IOCs) have been publicly released.
Maintain immutable backups to ensure operational recovery without paying a ransom for decryption.
Isolate critical servers, especially those containing sensitive financial data, to prevent lateral movement from less secure parts of the network.
Apply the principle of least privilege to file shares. Users should not have access to sensitive financial data unless absolutely required for their role.
Mapped D3FEND Techniques:
To detect the targeted theft of sensitive financial documents, as seen in the Jewett-Cameron attack, organizations must use Resource Access Pattern Analysis. First, identify and tag critical data repositories, such as the specific file share or SharePoint site where Form 10-K documents are prepared. Use a File Integrity Monitoring (FIM) or Data Security Posture Management (DSPM) tool to baseline normal access to this location. Any deviation should trigger an alert. For example, an alert should be generated if the data is accessed by a service account, an IT admin account not involved in finance, or at 3 AM. This allows for the detection of an attacker's internal reconnaissance and data staging activities before the final exfiltration and encryption.
Preventing the exfiltration of the 10-K data requires User Data Transfer Analysis, typically implemented via a Data Loss Prevention (DLP) solution. Configure DLP policies to specifically identify and monitor documents with characteristics of financial reports (e.g., keywords like 'Form 10-K', 'EBITDA', financial table structures). The policy should block any attempt to move these documents outside the network perimeter via email, web upload, or other channels. This acts as a crucial backstop, preventing the attackers from successfully completing their double extortion objective even if they gain access to the files internally.
A proactive defense is to use deception technology. Create decoy financial documents and place them in likely targeted locations. These documents, such as a file named 'FY2025_10K_DRAFT_CONFIDENTIAL.docx', can be instrumented to trigger a high-fidelity alert the moment they are opened, copied, or exfiltrated. Because no legitimate user has a reason to access these decoy files, any interaction is a strong signal of malicious activity. This can provide very early warning of a breach and an attacker's intent, allowing incident response teams to intervene long before the ransomware is deployed.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats