DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Already in receivership, Nygard hit with ransomware that permanently compromised their IT system

Posted on January 23, 2021 by Dissent

Here’s a ransomware incident that left me wondering whether the attackers — who have not been identified — had researched their victim before attacking and establishing their ransom demands. Read the breach notice, below, published this month, and then a media report on the attack that appears after that.

———————–

WINNIPEG, MB, Jan. 15, 2021 /PRNewswire/ –  On December 12, 2020 , a ransomware attack on the IT System serving Nygard entities in receivership (Nygard Receivership Companies) and which previously served other entities within the “Nygard group of companies”, was discovered. Immediately upon discovering the attack, cybersecurity professionals were engaged to assess and contain the breach. Certain actions implemented, upon instructions from the cybersecurity professionals, appear to have contained the further spread of the ransomware. While ongoing assessment work is proceeding, the full scope and impact of the attack has yet to be determined.

Out of an abundance of caution, Richter Advisory Group Inc., in its capacity as the Court-Appointed Receiver of Nygard Holdings (USA ) Limited, Nygard Inc., Fashion Ventures, Inc., Nygard NY Retail, LLC, 4093879 Canada Ltd., 4093887 Canada Ltd., Nygard International Partnership, Nygard Properties Ltd. and Nygard Enterprises Ltd., is issuing this statement to advise those individuals and parties that may have had dealings with Nygard Receivership Companies or other “Nygard-related” entities to monitor their information for any unusual activity, including, suspicious emails or other communications that claim to be from Nygard. If you have any doubt about the authenticity of an email you should contact Nygard at [email protected] (do not click on any hyperlinks in the email or click on “reply”) before acting.

You can read the full press release on  PRNewswire

—————

Media Coverage:

Caroline Barghout of CBC has a helpful recap of some of the history of Nygard’s financial woes and receivership.  According to her reporting, the Nygard Group of companies owed $50 million to creditors when it was placed under receivership in March. Two properties remain to be sold off this month and next month, if the sales go through, athough Nygard had tried to block one, claiming that the creditor had been paid off. The receiver — and the court — disagreed and the sale is to go ahead in February. But in any event, this appeared to be a group of companies in financial straits.

They also had other problems:

Peter Nygard, who in court filings says he is a consultant for the Nygard Group and sole owner of Nygard Enterprises Ltd., has been indicted on nine charges in the U.S. for allegations he sexually assaulted women and girls over a 25-year period in Canada, the U.S. and the Bahamas.

Nygard remains in custody at the Headingley Correctional Centre awaiting extradition to the U.S. He will appear in bail court Jan 28.

So… does this firm strike anyone as a great target for a ransomware attack or expensive extortion demand?

On December 12, and as the press release above described, the IT system of Nygard in receivership was attacked with ransomware. The type of ransomware was not identified in the report, but CBC reports that:

The receiver said the attackers originally asked for a ransom of 99 bitcoins but increased it to 198 bitcoins to decrypt and recover the files.

At December 12, rates for BTC, that would have been about slightly less than USD $3.8 million.

“Payment of the ‘ransom payment’ was not considered by the receiver,” wrote Richter.

The receiver said despite its best efforts, the IT system has been permanently compromised as a result of the attack, and that it’s now focusing on restoring high-priority servers only. Richter said there are nearly 250 severs within the Nygard Group.

So already in receivership and struggling, now they have the expense of recovery from a ransomware attack and they know that they may not be able to restore all servers.

I wouldn’t expect the criminals to have a heart, but I also wouldn’t expect companies in receivership to be targets likely to pay. If the attackers knew the company was in receivership and thought they’d be likely to pay because of that — I’d love to understand their reasoning.

Category: Business SectorMalwareNon-U.S.

Post navigation

← Tesla Claims Engineer Stole Secrets Just Days Into the Job
Rady Children’s Hospital sued over Blackbaud breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
  • Call for Public Input: Essential Cybersecurity Protections for K-12 Schools (2025-26 SY)
  • Cyberattack puts healthcare on hold for hundreds in St. Louis metro
  • Europol: DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants
  • DOGE aims to pool federal data, putting personal information at risk
  • Privacy concerns swirl around HHS plan to build Medicare, Medicaid database on autism

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.