Threat actors are sending highly convincing phishing emails to engineering and architecture firms disguised as project Request for Proposal (RFP) documents. Opening the attached “RFP” deploys ransomware that encrypts CAD files, project databases, and client deliverables. Multiple Texas firms have been hit in April 2026.
Attackers are conducting reconnaissance on engineering and architecture firms using LinkedIn, company websites, and public project databases to identify firms that are actively bidding on projects. They then craft highly convincing phishing emails that appear to come from government agencies, general contractors, or real estate developers, inviting the firm to submit a proposal for a specific project. The email includes an attached PDF or Word document described as the RFP package. When opened, the document exploits a Microsoft Office or Adobe Reader vulnerability — or uses a malicious macro — to deploy ransomware. The ransomware specifically targets engineering file types including .dwg, .rvt, .ifc, .pdf, and project database files.
Engineering and architecture firms are attractive ransomware targets for several reasons. First, project files are irreplaceable — years of CAD work, structural calculations, and client deliverables cannot be quickly recreated, creating enormous pressure to pay the ransom. Second, firms often have tight project deadlines where even a few days of downtime can trigger contract penalties. Third, engineering firms frequently hold sensitive client data including site plans, security system designs, and infrastructure details that have additional extortion value. Fourth, many engineering firms are small to mid-sized businesses without dedicated IT security staff, making them easier targets than large enterprises.
The sophistication of these attacks is notable. Attackers research the target firm’s recent projects and specializations, then craft RFPs that match the firm’s expertise. A structural engineering firm might receive an RFP for a bridge rehabilitation project from what appears to be TxDOT. A mechanical engineering firm might receive an HVAC design RFP from a known commercial developer. The email addresses are spoofed or use lookalike domains (txd0t.gov instead of txdot.gov). The RFP documents themselves are professionally formatted and contain realistic project details. This level of targeting means employees who would normally be skeptical of generic phishing emails may be fooled.
The most effective defense is a verification policy: any RFP or bid invitation received via email must be verified by calling the purported sender at a phone number obtained independently (not from the email) before any attachments are opened. This single control would prevent the majority of these attacks. Additionally, implement email security that sandboxes attachments before delivery, deploy endpoint detection and response (EDR) on all workstations, and ensure that project file repositories are backed up to immutable storage that cannot be encrypted by ransomware. Consider implementing a policy that all external email attachments are opened in a sandboxed virtual environment rather than directly on workstations.
If ransomware is detected on your network, immediately disconnect affected systems from the network — unplug network cables or disable Wi-Fi. Do not shut down systems, as this can destroy forensic evidence. Contact your IT provider or Segler.Net immediately at (210) 496-7313. Do not pay the ransom without consulting cybersecurity experts. Report the incident to the FBI’s IC3 at ic3.gov. If you have immutable backups, recovery without paying the ransom is typically possible. Segler.Net can assist with incident response, forensic investigation, and recovery planning.
Our San Antonio security team can assess your exposure, apply patches, and protect your business before attackers strike.
Get weekly security alerts — breaches, patch updates, compliance news, and threat intel — delivered free to your inbox every week.