DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on March 17, 2023 by chum1ng0

ES: HLA Grupo Hospitalario data listed for sale after web server misconfiguration

On March 14, a forum user on BreachForums listed data from the HLA Grupo Hospitalario in Spain for sale. The listing advertised 45,000 patient records and information on 1,600 doctors, with samples provided of each.

HLA Grupo Hospitalario is owned by Asisa, which has 18 hospitals and 17 centers located in different cities of Spain.

In private messages, the forum user provided DataBreaches with additional details. They claim the data were obtained from a misconfigured web server on March 10 and that they are asking $300 for all of the data, but the price is “obv tradable” (negotiable).

When contacted by Cronica Global, Asisa stated that they had activated a security alert and were studying the matter. However, they could not confirm the theft of data nor its supposed scope. DataBreaches sent an email inquiry to HLA Grupo Hospitalario asking for their response to the situation and claims, but received no reply.

CO: Schrader Camargo Named By LockBit

Schrader Camargo offers EPC services (Engineering, Procurement and Construction) services. Their name was added as a claimed victim on the LockBit3.0 leaks page on March 11, with some samples. LockBit has not leaked data other than samples so far, but claims to have about 267GB of data.

No notification of any incident appears on the firm’s website or on social networks, and there has been no reply to an email sent to them on March 16.

AR: CEOSP Suffers Cyberattack

La Cooperativa de Electricidad Obras y Servicios Públicos de San Antonio de Areco (CEOSP) posted a notice yesterday on Facebook about an incident:

In translation, the notice says, in part:

We inform you that on Friday, March 17, the CEOSP will remain closed due to problems with our servers. The technical staff of the cooperative is working since Sunday morning to solve this situation as soon as possible.

However, our claims guard will function normally. In case of any electrical inconvenience you can call 452525.

At the same time, we ask the community to make responsible use of electricity.

We apologize for the inconvenience caused.

Media outlet Boscoproducciones obtained some details about the type of incident:

Martin Rigassi … said that after opening an email, a virus entered the entire computer system, all the computers that were hooked up. Because of this, from now on they cannot enter any machine and whoever is behind this (they still don’t know or can locate the IP) is asking them for money in exchange for returning all the files, all the information that our city’s electricity cooperative has had for years.”

CEOSP has not replied to an email inquiry sent yesterday about the situation.

PR: Autoridad de Acueductos y Alcantarillados Confirms Ransomware Attack

Autoridad de Acueductos y Alcantarillados (AAA) is a public entity in charge of managing the quality, management and supply of drinking water in Puerto Rico. AAA  has confirmed to Vocero that they suffered a ransomware attack on March 13. The attack has reportedly affected AAA’s electronic customer service systems.

Arnaldo Jimenez Acevedo, Vice President of AAA’s strategic planning, said, “Certainly the agency suffered what is known as a cyberattack on Monday morning. Our system, a robust system, protected itself as part of the established processes and that happened around 6:37 in the morning.”

There has been no statement about who the threat actor(s) are, but AAA has indicated it will not pay any ransom to restore access because there is no indication that employee or customer data has been affected.


Editing by Dissent.

 

 

 

Category: Business SectorExposureHealth DataMalwareNon-U.S.

Post navigation

← El Camino Health investigating claims of a data breach
RAT developer arrested for infecting 10,000 PCs with malware →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post investigating cyberattack on journalists, WSJ reports
  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.