DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ie: Authorities investigating ransomware attack on charity that works with vulnerable children

Posted on April 17, 2024 by Dissent

The Journal reports:

A police investigation has been launched after a charity that works with vulnerable children suffered a data breach in a ransomware attack.

Extern, a cross-border social justice charity with offices in Belfast and Co Kildare, has confirmed that it has been the victim of a large ransomware cyber attack.

One source told The Journal that staff bank account details, addresses and email addresses had all been accessed by the hackers. Extern would not say whether service users have also been impacted.

The charity, which reportedly receives millions of euro in State funding from Tusla each year, said: “The full extent of this incident is being investigated and contained by external cyber security specialists.”

Read more at The Journal.

While the news outlet refers to this as a ransomware incident, there is nothing in the news report that specifically confirms or denies whether there was any encryption involved in the attack on Extern.

No ransomware group appears to have claimed credit for this one yet, but DataBreaches notes that there is an Irish rehab facility listed on LockBit this morning. Whether one affiliate might be responsible for this incident as well is unknown at this point.

DataBreaches emailed Extern to inquire whether encryption was involved in the attack and what group has attempted to extort them, but no reply has been received as yet.

 

No related posts.

Category: BlogBreach IncidentsMalwareNon-U.S.

Post navigation

← Lawsuits mount and cyberattack could cost UnitedHealth Group up to $1.6B this year
The Post and Courier hacked; Black Suit claims to have 500 GB of data. →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.