DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on December 2, 2022 by chum1ng0

UY: Ministry of Transport and Public Works victim of ransomware attack

Uruguay’s Ministry of Transport and Public Works (MTOP) was hit by a ransomware attack on October 17. On November 9, MTOP reported that it was back to normal after the ransomware attack, adding that it had recovered critical information and restored the affected services.

Weeks later, the threat group called “PLAY” claimed responsibility for the attack. PLAY claims to have 80 GB of the ministry’s files. As proof, they have released 5GB of information.

DataBreaches contacted MTOP via Facebook chat on November 28th, seeking any update and clarification as to whether they have negotiated with PLAY at all. No reply was received, but on November 30, MTOP issued a new statement. In that statement, they deny any communications with the attackers and estimate that the information stolen by the attackers is 0.03% of the information available to the ministry.

The ministry says they are still investigating in order to incorporate new security measures.

CO: Keralty Group attacked by RansomHouse

Keralty Group is the owner of EPS Sanitas, Colsanitas and Medisanitas, which offer health services and benefits to affiliates. Keralty has confirmed that it suffered a cyber attack. In a November 29  statement posted on Facebook, they reported that a criminal investigation has been initiated and a contingency plan has been implemented to maintain services.

On November 30, a Camilo Andres Garci (aka @hyperconnected on Twitter), claimed that all the clues he had gathered pointed to the threat group called “RansomHouse.” His attribution was supported by a copy of a ransom note posted by another Twitter user (@xfalexx) and by RansomHouse’s statement to BleepingComputer claiming responsibility for the November 27 attack. They also claimed to have acquired 3 TB of files.

Although RansomHouse claimed responsibility, the Keralty incident does not appear on their dedicated leak site at the time of publication.

In a November 30 incident update on its Facebook page, Keralty provided information to affiliates as to the situation and how to contact them. DataBreaches.net has sent questions to Keralty Group via Facebook chat on December 01. No reply has been received by publication.

AR: Argentina de Soluciones Satelitales discloses a cyber attack

On November 30, Argentina de Soluciones Satelitales (ARSAT) suffered a cyberattack. The telecommunications service provider announced the attack on its Twitter account:

ARSAT INFORMA:
En el día de hoy sufrimos una caída en el área de sistemas corporativos que afectó sólo a los sistemas internos de la empresa. En este momento nos encontramos aplicando procedimientos de prevención.

— ARSAT (@ARSATSA) November 30, 2022

El incidente no afectó ningún servicio ni los datos de nuestros clientes. ARSAT garantiza la conectividad, el tratamiento y resguardo de los mismos.

— ARSAT (@ARSATSA) November 30, 2022

Machine translation of tweets:

“Today we suffered a crash in the corporate systems area that affected only the company’s internal systems. We are currently implementing prevention procedures.

The incident did not affect any service or our customers’ data. ARSAT guarantees the connectivity, processing and safeguarding of such data.”

Infobae reported:

High sources told this media that the attack was registered at 9 p.m. on Tuesday and that the alarms sounded at 5 a.m. this Wednesday morning. In addition, they detected that the hackers tried to enter through the corporate system, which belongs to the administration, and not through the satellite systems.

As of publication, there has been no report as to who might be responsible for the attack or if there has been any ransom demand.

BR: Plascar Participacoes Industriais reportedly attacked by Vice Society

On November 30, the Vice Society ransomware group added Plascar Participações Industriais S.A. (Plascar) to their dedicated leak site. The threat actors claim to have 650 GB of information about the company that they have leaked.

There is no notice of any breach on Plascar’s website or on their social media accounts. Neither Plascar nor Vice have responded to emails sent to them on November 30.


Edited by Dissent.


Related:

  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Business SectorGovernment SectorHackHealth DataMalwareNon-U.S.

Post navigation

← Australia will now fine firms up to AU$50 million for data breaches
In: Hackers Selling Personal Data Of 150,000 Patients From a Tamil Nadu Hospital in Supply-Chain Attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.