DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Highly sensitive files from Berkeley County Schools dumped by ransomware gang

Posted on March 11, 2023 by Dissent

In early February, Berkeley County Schools in West Virginia experienced a ransomware attack.  On March 3, the district issued a notice on its website that stated their investigation determined “some data stored in Berkeley County Schools’ network may have been accessed that included employee Social Security numbers and direct deposit information.” That notice makes no…

Read more

Data Exfiltration Trends in Healthcare

Posted on March 11, 2023 by Dissent

From the Office of Information Security / HHS and the Health Sector Cybersecurity Coordination Center: Data Exfiltration Trends in Healthcare March 9, 2023

Read more

Another ransomware attack results in a HIPAA breach: Florida Medical Center

Posted on March 11, 2023 by Dissent

In a notice issued yesterday, Florida Medical Clinic (“FMC”) confirmed that unauthorized individuals gained access to its computer network and used ransomware to encrypt files. FMC detected suspicious activity on January 9, 2023, and the incident was fully contained within hours. FMC states they were able to “proactively isolate the exposure.”  DataBreaches has sent them…

Read more

Co-Working for the Ransomware Age: How Hive Thrived

Posted on March 9, 2023 by Dissent

Mathew J. Schwartz reports on how Hive blossomed as a business enterprise by co-working, or incorporating smaller victims and teams from Conti. Read his report with insights provided by Yelisey Bohuslavskiy, chief research officer at New York-based threat intelligence firm Red Sense. It makes for a fascinating read.

Read more

Northeast Surgical Group notifies 15,298 patients of a HIPAA breach, but doesn’t tell them their information has been dumped.

Posted on March 7, 2023 by Dissent

In January, the BianLian ransomware group added an unnamed medical group to their leak site. In February, they also posted a teaser on their BreachForums account. Although neither listing named the victim, DataBreaches was able to figure out that it was the Northeast Surgical Group (“NESG”) in Michigan. DataBreaches reached out to them multiple times,…

Read more

Medusa claims responsibility for Minneapolis Public Schools’ “encryption event,” provides proof of how much data they accessed

Posted on March 7, 2023 by Dissent

There’s another update to the “encryption  event” first disclosed by Minneapolis Public Schools (MPS) in February. As of their most recent last update, MPS had stated that they had been able to restore systems and no ransom had been paid. At that time, DataBreaches had not found any gang claiming responsibility for the breach or…

Read more
  • Previous
  • 1
  • …
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.