DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Wordfly customers begin to disclose ransomware attack on the vendor

Posted on August 6, 2022 by chum1ng0

Wordfly is a digital marketing platform that offers email, SMS marketing, forms and surveys for its clients to use with their customers or contacts.

On July 10, Wordfly experienced a ransomware attack that encrypted their environment and disrupted services until July 29, when their status account tweeted:

WordFly has returned to service. Thank you for your tremendous amount of patience and support. More info is coming to your inbox soon. https://t.co/s7YFm0f8U0

— WordFly Status (@wordflystatus) July 29, 2022

WordFly has returned to service. Thank you for your tremendous amount of patience and support. More info is coming to your inbox soon. https://t.co/s7YFm0f8U0

A fuller description of the incident by Wordfly can be found on their site. The statement does not indicate who the bad actor was. Of note, they report that the customer data included “email addresses, names, and other data our customers import or collect via Wordfly.”

In their disclosure, Wordfly also states:

It is our understanding that as of the evening of July 15, 2022, the data was deleted from the bad actor’s possession. We have no evidence to suggest, before the bad actor deleted the data, that the data was leaked or disseminated elsewhere. We also have no evidence to suggest that any of this information has been, or will be, misused.

So how did this deletion happen? Did Wordfly pay a ransom demand? DataBreaches sent an email inquiry to Wordfly days ago but no reply has been received.

Notifications Begin

Some of Wordfly’s clients have started notifying their customers. In its FAQ on the incident, Wordfly had written:

Should I contact my customers?

Due to the generally non-sensitive and public nature of the data that we know was exported so far, as well as our understanding of the nature of this ransomware event, we currently have no evidence to suggest that any of this information has been, or will be, misused to perpetrate harm to the rights and liberties of our customers or their subscribers. You may choose to contact your customers out of an abundance of transparency or if you know you uploaded or collected data in WordFly that is sensitive.

An FAQ for U.S./Canadian/Asian Pacific clients of Wordfly was provided separately, here.

As of yesterday, entities that had already disclosed this breach includes U.S. entities such as the Cleveland Museum of Art,  Louisville Zoo,  and the Smithsonian National Zoo.

Non-U.S. entities reporting the breach include:

Canadian entities reported by The Globe and Mail: the National Ballet of Canada, Toronto Symphony Orchestra, Canadian Opera Company, Canadian Stage Company, and The Musical Stage Company. Other Canadian entities include OceanWise, the Vancouver Symphony Orchestra, and Winspear.

The National Gallery of Australia and Sydney Dance Company in Australia  announced the breach, as did the Royal New Zealand Ballet.

In the U.K., the Box Plymouth and Courtauld Gallery both issued notifications.

The preceding are just a sampling of notices we have found around the web and there are likely many more.


Dissent also contributed to the research and reporting of this incident.


Related:

  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • No Kings. Not Today. Not Ever.
  • The Alliance That Wasn’t: A Critical Analysis of ReliaQuest’s Q3 2025 Ransomware Report
  • Heritage Provider Network $49.99M Class Action Settlement
Category: MalwareMiscellaneousSubcontractor

Post navigation

← RaidForums admin “Omni” granted conditional bail while U.K. considers U.S. extradition request
New GwisinLocker ransomware encrypts Windows and Linux ESXi servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.