DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

It: Municipality of Porto Sant’Elpidio publicly quiet after ransomware attack and partial dump of files

Posted on May 29, 2021 by Dissent

This week, DataBreaches.net reported on a new dedicated leak site and threat actors who had hit Clover Park School District in Washington.

The same threat actors, whose name is not even clear (are they PayOrGrief or Grief_List or…) have listed three other victims on their site who presumably did not pay their ransom demands. One of them is the municipality of Porto Sant’Elpidio in Italy.  Marco A. De Felice reports about that incident on Suspect File, noting that “About 900 MB for a total of about 1000 files have been dumped.” According to the threat actors, the total amount of stolen material is about 8 GB.

De Felice describes the data dump as mostly administrative files, but also files containing sensitive information on residents. In skimming the data dump, DataBreaches.net did see one report on a vehicle accident that identified the car, the owner, the driver, and that there were injuries, etc. How many other files may also contain personal information is not known to DataBreaches.net at this time.

There is nothing currently posted on the municipality’s web site about any attack, and no press releases or any news coverage that DataBreaches.net can find other than Suspect File’s coverage.  De Felice tried to find out what the government has done in response to the attack:

Before the publication of this article SuspectFile tried to get in touch with the Mayor via e-mail, asking to answer some questions. We asked, among other things, whether or not the Administration had complied with the provisions contained in the European Union regulation on the processing of personal data and privacy ( GDPR ) and if it had therefore already informed the Guarantor and the bodies of Competent police.

In the e-mail we sent, a copy was made of the President of the City Council, the Councilor for the budget / transparent Administration and the Local Police Command of the Municipality. We have not received any responses at the moment.

As I understand it, the GDPR at Article 33 requires that, in the event of a personal data breach, data controllers should notify the appropriate supervisory authority without undue delay and, where feasible, not later than 72 hours after having become aware of it.  If the threat actors really waited 21 days before dumping data, then the municipality may have known about this breach for weeks. What, if anything, have they done in response?

There is much we do not yet know — about this threat actor/group — and the impact of the incident on the municipality. Check SuspectFile daily and follow @amvinfe on Twitter to stay abreast of news.

 

Related posts:

  • TeamGhostShell posts “master list” of 548 leaks (so far)
  • The Ransomware Superhero of Normal, Illinois
  • “Without Undue Delay,” Part 2
  • k-12 school districts fall prey to Pysa ransomware
Category: Government SectorMalwareNon-U.S.

Post navigation

← UMD-Baltimore updates Accellion breach notification after finding PII and PHI involved
MA: Sturdy Hospital pays ransom after patient information is stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.