DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Line 204 hacked by TheDarkOverlord

Posted on October 31, 2017 by Dissent

Line 204 in Hollywood has disclosed that they were hacked by TheDarkOverlord. The Los Angeles Business Journal reports:

“All we know right now is that the group has stolen Line 204’s client database, and we’re working with the FBI now to uncover exactly what they may actually have in their possession,” a Line 204 spokeswoman said.

Line 204 Chief Executive Alton Butler said in statement, “I can confirm that Line 204 was a victim of an international cyberattack organization, on Thursday, Oct. 26, 2017. This group has hit other studios in the past year and is trying to continue their destructive path with Line 204. We immediately took measures to minimize the damages and block further invasion to protect the information of our company and clients.

The Hollywood Reporter also covers the studio’s announcement, but mistakenly reports that they had hacked into Netflix and Disney, when they had not hacked either of those entities.

Curiously, Line 204 is reporting that the hack occurred on October 26. Based on statements made by the hackers, the hack did not occur last Thursday.  In fact, on September 29, three days after informing DataBreaches.net of some of their recent activities including contacting a Hollywood studio that they had allegedly hacked, TDO had tweeted:

We’re back, Hollywood. Another studio has fallen.

— thedarkoverlord (@tdo_hackers) September 29, 2017

We’re back, Hollywood. Another studio has fallen.

The hackers subsequently informed this site that they were referring to Line 204, so the hack and data exfiltration likely did not happen last Thursday, but likely happened more than one month ago.

On October 26, the date the studio claims the hack occurred, the hackers posted two more tweets:

We’ve another big Hollywood story coming.

— thedarkoverlord (@tdo_hackers) October 26, 2017

We’ve another big Hollywood story coming.

and

We’ll give you 204 good reasons to walk our thin line.

— thedarkoverlord (@tdo_hackers) October 26, 2017

We’ll give you 204 good reasons to walk our thin line.

So perhaps the studio declared October 26 as the date of the hack because that’s when they first discovered the breach, even though the hackers claimed to have notified them/contacted them them one month earlier?  The hackers had not informed this site whether the “Hollywood studio” they referred to in September and which they named to this site as Line 204 in mid-October had actually acknowledged or answered their contact in September.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • How a hacking gang held Italy’s political elites to ransom
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
Category: Business SectorHackU.S.

Post navigation

← Ca: Privacy breach at Hay River clinic prompts discovery of 41 ‘irregularities’ with patient files
UK: Alleged hacker ‘used army of 9,000 ‘zombie’ computers to attack websites such as Skype, Google and Pokemon’ →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.