DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

It: Municipality of Porto Sant’Elpidio publicly quiet after ransomware attack and partial dump of files

Posted on May 29, 2021 by Dissent

This week, DataBreaches.net reported on a new dedicated leak site and threat actors who had hit Clover Park School District in Washington.

The same threat actors, whose name is not even clear (are they PayOrGrief or Grief_List or…) have listed three other victims on their site who presumably did not pay their ransom demands. One of them is the municipality of Porto Sant’Elpidio in Italy.  Marco A. De Felice reports about that incident on Suspect File, noting that “About 900 MB for a total of about 1000 files have been dumped.” According to the threat actors, the total amount of stolen material is about 8 GB.

De Felice describes the data dump as mostly administrative files, but also files containing sensitive information on residents. In skimming the data dump, DataBreaches.net did see one report on a vehicle accident that identified the car, the owner, the driver, and that there were injuries, etc. How many other files may also contain personal information is not known to DataBreaches.net at this time.

There is nothing currently posted on the municipality’s web site about any attack, and no press releases or any news coverage that DataBreaches.net can find other than Suspect File’s coverage.  De Felice tried to find out what the government has done in response to the attack:

Before the publication of this article SuspectFile tried to get in touch with the Mayor via e-mail, asking to answer some questions. We asked, among other things, whether or not the Administration had complied with the provisions contained in the European Union regulation on the processing of personal data and privacy ( GDPR ) and if it had therefore already informed the Guarantor and the bodies of Competent police.

In the e-mail we sent, a copy was made of the President of the City Council, the Councilor for the budget / transparent Administration and the Local Police Command of the Municipality. We have not received any responses at the moment.

As I understand it, the GDPR at Article 33 requires that, in the event of a personal data breach, data controllers should notify the appropriate supervisory authority without undue delay and, where feasible, not later than 72 hours after having become aware of it.  If the threat actors really waited 21 days before dumping data, then the municipality may have known about this breach for weeks. What, if anything, have they done in response?

There is much we do not yet know — about this threat actor/group — and the impact of the incident on the municipality. Check SuspectFile daily and follow @amvinfe on Twitter to stay abreast of news.

 

Category: Government SectorMalwareNon-U.S.

Post navigation

← UMD-Baltimore updates Accellion breach notification after finding PII and PHI involved
MA: Sturdy Hospital pays ransom after patient information is stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.