DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Already in receivership, Nygard hit with ransomware that permanently compromised their IT system

Posted on January 23, 2021 by Dissent

Here’s a ransomware incident that left me wondering whether the attackers — who have not been identified — had researched their victim before attacking and establishing their ransom demands. Read the breach notice, below, published this month, and then a media report on the attack that appears after that.

———————–

WINNIPEG, MB, Jan. 15, 2021 /PRNewswire/ –  On December 12, 2020 , a ransomware attack on the IT System serving Nygard entities in receivership (Nygard Receivership Companies) and which previously served other entities within the “Nygard group of companies”, was discovered. Immediately upon discovering the attack, cybersecurity professionals were engaged to assess and contain the breach. Certain actions implemented, upon instructions from the cybersecurity professionals, appear to have contained the further spread of the ransomware. While ongoing assessment work is proceeding, the full scope and impact of the attack has yet to be determined.

Out of an abundance of caution, Richter Advisory Group Inc., in its capacity as the Court-Appointed Receiver of Nygard Holdings (USA ) Limited, Nygard Inc., Fashion Ventures, Inc., Nygard NY Retail, LLC, 4093879 Canada Ltd., 4093887 Canada Ltd., Nygard International Partnership, Nygard Properties Ltd. and Nygard Enterprises Ltd., is issuing this statement to advise those individuals and parties that may have had dealings with Nygard Receivership Companies or other “Nygard-related” entities to monitor their information for any unusual activity, including, suspicious emails or other communications that claim to be from Nygard. If you have any doubt about the authenticity of an email you should contact Nygard at [email protected] (do not click on any hyperlinks in the email or click on “reply”) before acting.

You can read the full press release on  PRNewswire

—————

Media Coverage:

Caroline Barghout of CBC has a helpful recap of some of the history of Nygard’s financial woes and receivership.  According to her reporting, the Nygard Group of companies owed $50 million to creditors when it was placed under receivership in March. Two properties remain to be sold off this month and next month, if the sales go through, athough Nygard had tried to block one, claiming that the creditor had been paid off. The receiver — and the court — disagreed and the sale is to go ahead in February. But in any event, this appeared to be a group of companies in financial straits.

They also had other problems:

Peter Nygard, who in court filings says he is a consultant for the Nygard Group and sole owner of Nygard Enterprises Ltd., has been indicted on nine charges in the U.S. for allegations he sexually assaulted women and girls over a 25-year period in Canada, the U.S. and the Bahamas.

Nygard remains in custody at the Headingley Correctional Centre awaiting extradition to the U.S. He will appear in bail court Jan 28.

So… does this firm strike anyone as a great target for a ransomware attack or expensive extortion demand?

On December 12, and as the press release above described, the IT system of Nygard in receivership was attacked with ransomware. The type of ransomware was not identified in the report, but CBC reports that:

The receiver said the attackers originally asked for a ransom of 99 bitcoins but increased it to 198 bitcoins to decrypt and recover the files.

At December 12, rates for BTC, that would have been about slightly less than USD $3.8 million.

“Payment of the ‘ransom payment’ was not considered by the receiver,” wrote Richter.

The receiver said despite its best efforts, the IT system has been permanently compromised as a result of the attack, and that it’s now focusing on restoring high-priority servers only. Richter said there are nearly 250 severs within the Nygard Group.

So already in receivership and struggling, now they have the expense of recovery from a ransomware attack and they know that they may not be able to restore all servers.

I wouldn’t expect the criminals to have a heart, but I also wouldn’t expect companies in receivership to be targets likely to pay. If the attackers knew the company was in receivership and thought they’d be likely to pay because of that — I’d love to understand their reasoning.


Related:

  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
Category: Business SectorMalwareNon-U.S.

Post navigation

← Tesla Claims Engineer Stole Secrets Just Days Into the Job
Rady Children’s Hospital sued over Blackbaud breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.