DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mobile County Commission notifies employees of data breach; threat actors dump more data

Posted on July 24, 2021 by Dissent

WKRG reports an update to a ransomware attack on Mobile County that was previously reported in June after SuspectFile broke the story of Grief’s attack and claims.

As previously addressed in statements published by Mobile-area media, Mobile County recently discovered suspicious activity related to some of its computer systems. We immediately shut down and launched an investigation, with the assistance of third-party forensic specialists, to determine the nature and scope of the activity. Once the forensic specialists confirmed that our network was secure, we safely
restored our systems.

Although our investigation is ongoing, we have determined that certain computer systems were subject to unauthorized access on May 24, 2021. Through the forensics process, we learned on July 1, 2021 that employee information was at risk.

Read more of the notice on WKRG.

As reported previously, Grief threat actors claimed to have exfiltrated 95 GB of data, and had uploaded a small portion of it as proof. On July 20, they updated their listing on the incident, and dumped even more data, noting:

The company appointed by the negotiator was not interested in resolving the situation and was stalling the time. That’s why we’re remove decryption keys and all the DATA can’t be recovered. All stolen DATA will be published step by step.

 

Category: Government SectorMalwareU.S.

Post navigation

← Convenience Store Chain Can’t Shield Investigative Report on Data Breach From Discovery, Judge Rules
PHOBOS ransomware infection at the Clinical Hospital No.1 CF Witting in Bucharest →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Evoke Wellness to Pay $1.9 Million to Settle FTC Claims That They Misled Consumers Seeking Substance Use Disorder Treatment
  • Former Hilliard treatment center employee accused of selling patient data on dark web
  • Trump Rewrites Cybersecurity Policy in Executive Order
  • AMI Group – Travel & Tours notice of ransomware attack
  • Resource: Insider Threat reports
  • Za: Cyber extortionist sentenced to eight years in jail
  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy Victory! Judge Grants Preliminary Injunction in OPM/DOGE Lawsuit
  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.