The same group of threat actors who recently hit the South African National Space Agency (SANSA), are now claiming to have hit a Mexican government health agency that is involved in COVID testing or research: El Instituto Nacional de Medicina Genómica (Inmegen).
Limited data has been publicly dumped so far, but it appears to include a database called “COVID” that has a number of tables relating to collection of information on COVID-19 patients. One table, as an example, includes 400 records with fields like name, age, date of birth, email, phone, and other details.
Other files in the dump contain testing results on named patients, such as one folder that contains more than two dozen .pdf files.
CoomingProject’s site says they are not a ransomware group. They do not say what demands they are making on this victim or how much data they have from them, but in reply to an inquiry from DataBreaches.net, they claimed that they had exfiltrated 50 GB of data from Inmegen and “their partner.”
Perhaps one of the oddest things about their data dump is that it included a file call “README.” Thinking it might be a copy of the ransom note, DataBreaches.net opened it, only to find what appeared to be an ad or listing for KelvinSecTeam.
The @KelvinSecTeam channel on Telegram has more than 600 members, but there is no mention in their channel of CoomingProject or Inmegen, so this remains a bit of a head-scratcher and may just be an error.
Inmegen has not responded to multiple inquires asking about the attack, and there is no notice on their web site that we have seen. This post will be updated if more information becomes available.
Additional research by Chum1ng0