DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on February 3, 2023 by chum1ng0

EC: Seguros Equinoccial S.A data keaked by Vice Society

On January 28, data allegedly from Seguros Equinoccial S.A. was added to Vice Society’s leak site. Seguros Equinoccial offers various kinds of life, auto, corporate, and other insurance plans to individuals, families, and businesses.

Inspection of the leaked data revealed a folder called “bck” with 25 files in Excel. The reports contained fields such  Name, Surname, Policy, ID or Ruc, Name of the Insured, Address, Phone, Mail, Chassis, Make, Model, Plates, Engine, Color, Sum Insured.

There is no notice on their website about any ransomware incident, and the firm did not reply to email inquiries sent on January 30 and February 2.

It appears that customer data has been acquired and leaked, but it is not known if any of the individual or business customers have been notified.

ES: LockBit claims to have attacked Luaces Asesores

In a recent update to their leak site, LockBit claimed to have attacked Luaces Asesores, an accounting, tax, and labor advisor firm. The firm’s name was added to the leak site on January 30 but without any file list or proof of claim.

An email to Luaces sent on January 30  asking about the claimed attack received no reply.  As of publication, there is no notice of any incident on their website and it appears that the site may not have been updated since the 2017 income tax period.

MX: IT Servicios attack claimed by LockBit

Telecommunications firm IT Servicios was also added to LockBit3.0’s leak site on January 30, and also without any proof. There is no notice of any incident on their website at publication time and they did not reply to an email inquiry of January 30.

BR: Pharma Gestao attack claimed by LockBit

Pharma Gestao EPP-LTDA provides accounting, tax, financial, corporate, and consulting services for more than 180 pharmacies, partnering with other firms such as Price Baixo, Farma Voce, and Top Farma. On February 1, Pharma Gestao was added to the LockBit3.0 leak site, but without any proof. We could find no notice on their site or social media and have received no reply to an email inquiry sent yesterday.

MX: Casa Ley grocery chain attack claimed by Royal

Casa Ley grocery store chain has 290 stores. It was added to the Royal ransomware leak site yesterday, but Royal does not post any proof when they first list a victim and they do not make any claims about how much data they might have acquired. Casa Ley has not published any notice or statement about the claimed attack on their site or social media, and has not replied to an email inquiry.

PLEASE NOTE:

This column reports on what we see published. But ransomware groups can err in their claims about who they attacked, so if there is no proof published, any claims posted or noted here should be viewed as unconfirmed claims. Future Trozos y Piezas columns may contain updates on specific claims. — Dissent 


Additional material and editing by Dissent.


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • Romanian prisoner hacks prison IT system in plot made for a Netflix movie
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
Category: Breach IncidentsBusiness SectorHackMalwareNon-U.S.Subcontractor

Post navigation

← Nonstop Health data and source code appear to have been leaked on hacking forum
Julius ‘zeekill’ Kivimäki, former Lizard Squad hacker, arrested in France →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.