DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hit with ransomware, Prince Edward Island notifies residents and continues recovery efforts

Posted on March 1, 2020 by Dissent

Earlier today, Maze Team added Prince Edward Island (PEI) to their website where they list victims who have refused to pay their ransom demands. As they have done in other cases, the attackers also provided some files that they exfiltrated as proof.

Maze Team may be wasting their time attempting to get Prince Edward Island to pay ransom.

In looking into this attack, DataBreaches.net found that PEI had issued a statement on its site on February 25:

Islanders information protected as Government addresses malware discovery

On Sunday afternoon (February 23), Government discovered malware on its network, and extensive efforts continue to be taken to ensure Islanders’ personal information is protected.

Best practice measures to combat the malware were immediately put in place, and an extensive investigation is underway. Based on our investigation, there is currently no reason to believe that Islanders’ personal information has been affected by the malware.

Government services continue to be available without interruption, including payments to clients; however, Islanders may experience slower services for a few more days as efforts are ongoing to ensure the elimination of the malware and the continued safety of Islanders’ information.

As stewards of Islanders’ personal information, we felt that the public should be made aware of this discovery and reassured that security of their information is extremely important to the Government.

So far, then, there doesn’t seem to be any significant disruption in services, and kudos to PEI for being able to recover and keep services running. DataBreaches.net has reached out to PEI to ask them how much ransom was demanded, and to ask them to confirm whether any personal information was involved (although much of their data should be public record anyway). This post may be updated if a reply is received, but it appears that Maze Team is wasting its time trying to get any money from PEI.


Related:

  • Maze Team continues its campaign of naming, shaming, and dumping victims' data while other attackers adopt the same model
  • TeamGhostShell posts "master list" of 548 leaks (so far)
  • "Without Undue Delay," Part 2
  • The New Target That Enables Ransomware Hackers to Paralyze Dozens of Towns and Businesses at Once
  • Maze Team updates its site, dumps more victims' data
Category: Government SectorMalwareNon-U.S.

Post navigation

← (UPDATED) Texas bank attacked with DoppelPaymer ransomware — attackers’ report
AU: Alinta Energy accused of putting customers’ sensitive information at risk →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Telus Digital confirms breach after ShinyHunters claims 1 petabyte data theft
  • China’s CERT warns OpenClaw can inflict nasty wounds
  • Bell Ambulance data breach impacted over 238,000 people
  • Lotte Card fined 9.6 billion won for leaking users’ social registration numbers
  • Handala claims responsibility for attack on medical device maker Stryker
  • Police Scotland fined £66k for extracting and sharing mobile phone data
  • The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life
  • Viral ‘Quittr’ Porn Addiction App Exposed the Masturbation Habits of Hundreds of Thousands of Users
  • New Report Finds One in Two U.S. School Districts Experienced a Cybersecurity Incident in 2025
  • Foreign hacker in 2023 compromised Epstein files held by FBI, source and documents show

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy watchdogs sound alarm over US bid to get travellers’ social media
  • Petition filed over misuse of protesters’ data by Kenyan government and telcos
  • When Miscarriage Is Recast As Murder
  • The Government Uses Targeted Advertising to Track Your Location. Here’s What We Need to Do.
  • Santa Ana homeowner says insurance company used drone to inspect her roof without telling her

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: Dissent.73

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.