DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on December 2, 2022 by chum1ng0

UY: Ministry of Transport and Public Works victim of ransomware attack

Uruguay’s Ministry of Transport and Public Works (MTOP) was hit by a ransomware attack on October 17. On November 9, MTOP reported that it was back to normal after the ransomware attack, adding that it had recovered critical information and restored the affected services.

Weeks later, the threat group called “PLAY” claimed responsibility for the attack. PLAY claims to have 80 GB of the ministry’s files. As proof, they have released 5GB of information.

DataBreaches contacted MTOP via Facebook chat on November 28th, seeking any update and clarification as to whether they have negotiated with PLAY at all. No reply was received, but on November 30, MTOP issued a new statement. In that statement, they deny any communications with the attackers and estimate that the information stolen by the attackers is 0.03% of the information available to the ministry.

The ministry says they are still investigating in order to incorporate new security measures.

CO: Keralty Group attacked by RansomHouse

Keralty Group is the owner of EPS Sanitas, Colsanitas and Medisanitas, which offer health services and benefits to affiliates. Keralty has confirmed that it suffered a cyber attack. In a November 29  statement posted on Facebook, they reported that a criminal investigation has been initiated and a contingency plan has been implemented to maintain services.

On November 30, a Camilo Andres Garci (aka @hyperconnected on Twitter), claimed that all the clues he had gathered pointed to the threat group called “RansomHouse.” His attribution was supported by a copy of a ransom note posted by another Twitter user (@xfalexx) and by RansomHouse’s statement to BleepingComputer claiming responsibility for the November 27 attack. They also claimed to have acquired 3 TB of files.

Although RansomHouse claimed responsibility, the Keralty incident does not appear on their dedicated leak site at the time of publication.

In a November 30 incident update on its Facebook page, Keralty provided information to affiliates as to the situation and how to contact them. DataBreaches.net has sent questions to Keralty Group via Facebook chat on December 01. No reply has been received by publication.

AR: Argentina de Soluciones Satelitales discloses a cyber attack

On November 30, Argentina de Soluciones Satelitales (ARSAT) suffered a cyberattack. The telecommunications service provider announced the attack on its Twitter account:

ARSAT INFORMA:
En el día de hoy sufrimos una caída en el área de sistemas corporativos que afectó sólo a los sistemas internos de la empresa. En este momento nos encontramos aplicando procedimientos de prevención.

— ARSAT (@ARSATSA) November 30, 2022

El incidente no afectó ningún servicio ni los datos de nuestros clientes. ARSAT garantiza la conectividad, el tratamiento y resguardo de los mismos.

— ARSAT (@ARSATSA) November 30, 2022

Machine translation of tweets:

“Today we suffered a crash in the corporate systems area that affected only the company’s internal systems. We are currently implementing prevention procedures.

The incident did not affect any service or our customers’ data. ARSAT guarantees the connectivity, processing and safeguarding of such data.”

Infobae reported:

High sources told this media that the attack was registered at 9 p.m. on Tuesday and that the alarms sounded at 5 a.m. this Wednesday morning. In addition, they detected that the hackers tried to enter through the corporate system, which belongs to the administration, and not through the satellite systems.

As of publication, there has been no report as to who might be responsible for the attack or if there has been any ransom demand.

BR: Plascar Participacoes Industriais reportedly attacked by Vice Society

On November 30, the Vice Society ransomware group added Plascar Participações Industriais S.A. (Plascar) to their dedicated leak site. The threat actors claim to have 650 GB of information about the company that they have leaked.

There is no notice of any breach on Plascar’s website or on their social media accounts. Neither Plascar nor Vice have responded to emails sent to them on November 30.


Edited by Dissent.

Category: Business SectorGovernment SectorHackHealth DataMalwareNon-U.S.

Post navigation

← Australia will now fine firms up to AU$50 million for data breaches
In: Hackers Selling Personal Data Of 150,000 Patients From a Tamil Nadu Hospital in Supply-Chain Attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.