DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on March 3, 2023 by chum1ng0

ES:  Stormous claims attack on Zurcal

The Zurcal group, which belongs to the energy saving and efficiency sector, has been named by Stormous Ransomware in its Telegram channel. The attack was posted on February 24 with images showing invoices and plans. Stormous gave the victim one week to respond.

In a subsequent post, Stormous added more proof and images, including one NIF (tax identification number).

Zurcal has not posted any notice on its site or social media and has not replied to inquiries by DataBreaches.

BR: Ragnar_Locker indignantly responds to a victim’s claim of no data leakage

“AASP claim there was no data leakage!” Ragnar_Locker posted on February 22.

AASP is the Associação de Advogados de São Paulo, an association of São Paulo lawyers. The association’s Twitter account had acknowledged an incident in a January 27 tweet, but denied any data exfiltration, a denial that they reiterated subsequently, claiming (translation): “We reiterate that no type of leakage of personal or institutional data has been detected,” and “We have full backup and it is important to highlight that personal and institutional information is encrypted, preventing data leakage.” (January 30 tweet).

In response, the threat actors posted proof, including some items with personal information.

AASP did not respond to inquiries by DataBreaches and posted nothing further about the attack.

[Update: Shortly after publication, Ragnar_Locker posted an update to their leak site. They uploaded 200 GB of files from AASP plus numerous screenshots with personal information.]

CO: Hackers attack Fasecolda

La Federación de Aseguradores Colombianos (Fasecolda) is an association for Colombian insurers. Fasecolda was reportedly the target of hackers, but the attack was detected and staff disconnected systems with information on automobiles and Compulsory Traffic Accident Insurance (Soat).

 API reported that the containment schemes were effective in stopping the attack. Fasecolda has not issued any updates since February 28.

MX: Investigation into cyberattack of Rosarito continues

On February 17, Rosarito’s city council experienced a cyberattack that resulted in hundreds of servers being infected. Citizens were affected because the attack made it impossible for them to pay property taxes and other municipal service fees for several days.

The attack was reported to the State Attorney General’s office on February 24, and the municipality is still investigating this incident.

No group has claimed responsibility for the attack and there has been no mention of any ransom demands.


Edited by Dissent.

Category: Breach IncidentsBusiness SectorGovernment SectorHackMalwareNon-U.S.

Post navigation

← Oakland continues to work on recovery from ransomware attack; Play claims responsibility
Another ransomware-related lawsuit settles: Preferred Home Care →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.