DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Major European call center provider goes down in ransomware attack; not negotiating with Conti

Posted on September 25, 2021 by Dissent

Catalin Cimpanu reports:

GSS, the Spanish and Latin America division of Covisian, one of Europe’s largest customer care and call center providers, has suffered a debilitating ransomware attack that froze a large part of its IT systems and crippled call centers across its Spanish-speaking customerbase.

Call centers and automated customer support phone services for companies and government organizations in Spain and Latin America have been unreachable this week.

Read more on The Record.

DataBreaches.net had been in touch with Covisian about the breach and a chat log circulating on the internet that mentioned an $8.5 million ransom demand and that had a decrypted file in it that mentioned GrupoGSS.  A spokesperson for Covisian responded:

The attack took place on Saturday, September 18th. It is a ransomware CONTI, whose main objective is the encryption of information.

The cyberattack, from a data protection point of view, has not affected any of our clients to date. As a preventive measure against the cyberattack and in order to guarantee data protection, the services that could be affected were interrupted. From last Saturday to today, there is no evidence of leakage of any personal data. From GSS we hope to restore interrupted services as soon as possible, as long as their security is guaranteed.

We are following each and every one of the steps of the security protocol to guarantee the recovery of the service with total security as soon as possible.

We hereby confirm that neither GSS nor Covisian have conducted negotiations of any kind with anyone regarding the cyberattack.

Additionally, GSS informs that, from the first moment, it contacted those responsible for Computer Crimes of the Guardia Civil to file a complaint about the attack suffered on 9/18/21 by the Conti ransomware. GSS also informs that the complaint will be presented next week, once the necessary technical reports are available, so that the Guardia Civil and the Judicial Authority can initiate the investigation. Furthermore, GSS has already communicated the attack suffered to INCIBE, the National Cybersecurity Institute.

So according to them, there have been no negotiations or any ransom discussions.

No related posts.

Category: Business SectorCommentaries and AnalysesMalwareNon-U.S.

Post navigation

← Epik hack reveals prominent, Trump-supporting websites under subpoena investigation
United Health Centers of San Joaquin Valley remains publicly silent after ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake.
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.