DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on December 23, 2022 by chum1ng0

MX: Attack on Financiera Reyes Claimed by LockBit3.0

On December 12, Financiera Reyes was added to the leak site of LockBit3.0. No proof was provided, however. Finding no notice on the financial institution’s social media sites or web site, DataBreaches contacted Financiera Reyes on December 12 to ask them to confirm or deny any incident. No reply has been received and DataBreaches has not found any updates on the claimed attack.

VE: Attack on Amazing Global Claimed by LockBit3.0

On December 12, LockBit3.0 also added a technology firm, Amazing-Global, to their leak site. As with Financiera Reyes, there was no proof posted, and DataBreaches could find nothing on the technology firm’s web site or social media about any attack.  Amazing Global did not reply to an inquiry sent to it on December 12.

MX: Sustainability company named by LockBit3.0

There seems to be a theme here involving LockBit3.0 activity. Veolus was also added to the LockBit3.0 leaks page, but without any proof. And yet again, we have found no confirmation and received no reply from the alleged victim firm.

BR: Textile Firm Attack Claimed by LockBit3.0

On December 10, Biotipo was added to the LockBit3.0 leaks page. Some sample files provided as proof appear consistent with the jeans firm.  No notice appears on their social media or web site, however, and they, too, did not reply to DataBreaches’ inquiries.

TT: Beacon Insurance Company Ltd Named by DataLeak

On November 27, The Beacon Insurance Company Ltd was named on a web site called “DataLeak.” The site claims to have about 310GB of information on this insurer that has not yet been leaked. In response to our email inquiry of December 7, Beacon insurance responded on December 12:

“Thank you for your email. We were contacted, yes, and have thoroughly investigated the case, mitigated the exposure and all relevant parties were informed.”

CO: Medellin’s Public Utilities Company Under Cyber Attack

On December 13, public services provider Empresas Públicas de Medellín (EPM) tweeted that it was facing a cybersecurity incident .

EPM se permite informar a la opinión pública que se encuentra atendiendo un incidente de ciberseguridad, por lo que ha solicitado a sus funcionarios trabajar hoy desde sus casas. Esta situación no tiene afectación en la prestación de los servicios públicos
de energía, agua y gas

— EPM estamos ahí (@EPMestamosahi) December 13, 2022

Machine Translation:

“EPM informs the public that it is dealing with a cybersecurity incident, so it has asked its employees to work from home today. This situation does not affect the provision of energy, water and gas public services.”

In the same Tweet thread, EPM also made clear that customer service offices and virtual customer service channels were not available.

El Colombiano reports that services were impacted for customers who use prepaid electric and water services. Unable to recharge or replenish their accounts, refrigerators stopped working and food started spoiling, etc.

According to Bleeping Computer, ALPHV (BlackCat) threat actors are responsible for this incident.

BR: Aegea Suffers Cyberattack

Aegea Saneamento e Participações S.A, a private company operating in the water and waste sector, has experienced a cyber-attack. The attack was announced on December 14 and the systems have already been restored, according to InfoMoney. The identity of the threat actors was not mentioned.

MX: ASEG Hit by Ransomware Attack

The technology system of the Superior Audit Office of Guanajuato (ASEG) suffered a ransomware attack that encrypted all the information of the system. The attack was detected on December 5. In a statement to Periodico Correo, the head of the body Javier Perez Salazar said (translation):

“Everything we work with in audits, legal processes, notifications, electronic signature, all our modules were encrypted and we cannot use them”.

So far, the identity of the attackers has not been revealed.


Edited by Dissent


Related:

  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Authorities released free decryptor for Phobos and 8base ransomware
  • Missouri Adopts New Data Breach Notice Law
Category: Breach IncidentsMalware

Post navigation

← Claimant to Maintain Anonymity in English High Court Cyber Attack Case
Ca: Doctor’s records improperly disposed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com
  • Canada’s Bill C-2 Opens the Floodgates to U.S. Surveillance
  • Wiretap Suits Pit Old Privacy Laws Against New AI Technology
  • Action against tiny Scottish charity sparks huge ICO row
  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report