DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

It: Municipality of Porto Sant’Elpidio publicly quiet after ransomware attack and partial dump of files

Posted on May 29, 2021 by Dissent

This week, DataBreaches.net reported on a new dedicated leak site and threat actors who had hit Clover Park School District in Washington.

The same threat actors, whose name is not even clear (are they PayOrGrief or Grief_List or…) have listed three other victims on their site who presumably did not pay their ransom demands. One of them is the municipality of Porto Sant’Elpidio in Italy.  Marco A. De Felice reports about that incident on Suspect File, noting that “About 900 MB for a total of about 1000 files have been dumped.” According to the threat actors, the total amount of stolen material is about 8 GB.

De Felice describes the data dump as mostly administrative files, but also files containing sensitive information on residents. In skimming the data dump, DataBreaches.net did see one report on a vehicle accident that identified the car, the owner, the driver, and that there were injuries, etc. How many other files may also contain personal information is not known to DataBreaches.net at this time.

There is nothing currently posted on the municipality’s web site about any attack, and no press releases or any news coverage that DataBreaches.net can find other than Suspect File’s coverage.  De Felice tried to find out what the government has done in response to the attack:

Before the publication of this article SuspectFile tried to get in touch with the Mayor via e-mail, asking to answer some questions. We asked, among other things, whether or not the Administration had complied with the provisions contained in the European Union regulation on the processing of personal data and privacy ( GDPR ) and if it had therefore already informed the Guarantor and the bodies of Competent police.

In the e-mail we sent, a copy was made of the President of the City Council, the Councilor for the budget / transparent Administration and the Local Police Command of the Municipality. We have not received any responses at the moment.

As I understand it, the GDPR at Article 33 requires that, in the event of a personal data breach, data controllers should notify the appropriate supervisory authority without undue delay and, where feasible, not later than 72 hours after having become aware of it.  If the threat actors really waited 21 days before dumping data, then the municipality may have known about this breach for weeks. What, if anything, have they done in response?

There is much we do not yet know — about this threat actor/group — and the impact of the incident on the municipality. Check SuspectFile daily and follow @amvinfe on Twitter to stay abreast of news.

 


Related:

  • Software companies must be held liable for British economic security, say MPs
  • Russia arrests young cybersecurity entrepreneur on treason charges
  • UK privacy regulator has seen ‘collapse in enforcement activity,’ rights coalition says
  • Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub
  • Ph: Department of the Interior and Local Government to probe alleged data breach by hackers
  • Cyberattack disables Onsolve Code Red emergency alert system across St. Louis region (1)
Category: Government SectorMalwareNon-U.S.

Post navigation

← UMD-Baltimore updates Accellion breach notification after finding PII and PHI involved
MA: Sturdy Hospital pays ransom after patient information is stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • UK Government Considers Computer Misuse Act Revision
  • Japan issues arrest warrant against teen suspected of cyberattack using AI
  • How old is the average hacker? What does a new research report suggest? (1)
  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.