DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on December 23, 2022 by chum1ng0

MX: Attack on Financiera Reyes Claimed by LockBit3.0

On December 12, Financiera Reyes was added to the leak site of LockBit3.0. No proof was provided, however. Finding no notice on the financial institution’s social media sites or web site, DataBreaches contacted Financiera Reyes on December 12 to ask them to confirm or deny any incident. No reply has been received and DataBreaches has not found any updates on the claimed attack.

VE: Attack on Amazing Global Claimed by LockBit3.0

On December 12, LockBit3.0 also added a technology firm, Amazing-Global, to their leak site. As with Financiera Reyes, there was no proof posted, and DataBreaches could find nothing on the technology firm’s web site or social media about any attack.  Amazing Global did not reply to an inquiry sent to it on December 12.

MX: Sustainability company named by LockBit3.0

There seems to be a theme here involving LockBit3.0 activity. Veolus was also added to the LockBit3.0 leaks page, but without any proof. And yet again, we have found no confirmation and received no reply from the alleged victim firm.

BR: Textile Firm Attack Claimed by LockBit3.0

On December 10, Biotipo was added to the LockBit3.0 leaks page. Some sample files provided as proof appear consistent with the jeans firm.  No notice appears on their social media or web site, however, and they, too, did not reply to DataBreaches’ inquiries.

TT: Beacon Insurance Company Ltd Named by DataLeak

On November 27, The Beacon Insurance Company Ltd was named on a web site called “DataLeak.” The site claims to have about 310GB of information on this insurer that has not yet been leaked. In response to our email inquiry of December 7, Beacon insurance responded on December 12:

“Thank you for your email. We were contacted, yes, and have thoroughly investigated the case, mitigated the exposure and all relevant parties were informed.”

CO: Medellin’s Public Utilities Company Under Cyber Attack

On December 13, public services provider Empresas Públicas de Medellín (EPM) tweeted that it was facing a cybersecurity incident .

EPM se permite informar a la opinión pública que se encuentra atendiendo un incidente de ciberseguridad, por lo que ha solicitado a sus funcionarios trabajar hoy desde sus casas. Esta situación no tiene afectación en la prestación de los servicios públicos
de energía, agua y gas

— EPM estamos ahí (@EPMestamosahi) December 13, 2022

Machine Translation:

“EPM informs the public that it is dealing with a cybersecurity incident, so it has asked its employees to work from home today. This situation does not affect the provision of energy, water and gas public services.”

In the same Tweet thread, EPM also made clear that customer service offices and virtual customer service channels were not available.

El Colombiano reports that services were impacted for customers who use prepaid electric and water services. Unable to recharge or replenish their accounts, refrigerators stopped working and food started spoiling, etc.

According to Bleeping Computer, ALPHV (BlackCat) threat actors are responsible for this incident.

BR: Aegea Suffers Cyberattack

Aegea Saneamento e Participações S.A, a private company operating in the water and waste sector, has experienced a cyber-attack. The attack was announced on December 14 and the systems have already been restored, according to InfoMoney. The identity of the threat actors was not mentioned.

MX: ASEG Hit by Ransomware Attack

The technology system of the Superior Audit Office of Guanajuato (ASEG) suffered a ransomware attack that encrypted all the information of the system. The attack was detected on December 5. In a statement to Periodico Correo, the head of the body Javier Perez Salazar said (translation):

“Everything we work with in audits, legal processes, notifications, electronic signature, all our modules were encrypted and we cannot use them”.

So far, the identity of the attackers has not been revealed.


Edited by Dissent


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • The Alliance That Wasn’t: A Critical Analysis of ReliaQuest’s Q3 2025 Ransomware Report
Category: Breach IncidentsMalware

Post navigation

← Claimant to Maintain Anonymity in English High Court Cyber Attack Case
Ca: Doctor’s records improperly disposed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.