DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Update to Haywood County Schools ransomware attack

Posted on September 5, 2020 by Dissent

There’s an update to the Haywood County Schools ransomware attack previously noted on this site. Lawrence Abrams reports that it was SunCrypt ransomware that was used in the attack, and although the district   resumed remote learning on August 31, some school services remain impacted. As part of the double extortion and leak site model that…

Read more

Ca: Ministry of Justice victim of cyberattack that resulted in members of the public receiving emails with emotet

Posted on September 3, 2020 by Dissent

The following is a Google translation of a recent news story by Hugo Joncas: Hackers have managed to infiltrate the Justice Department’s system, and even send malware to citizens who traded with these addresses. The ministry was careful not to warn the public about the attack, but after many questions from our Bureau of Investigation,…

Read more

MA: Somerset Berkley Regional High School a victim of ransomware attack

Posted on September 3, 2020 by Dissent

Herald News Staff reports: Somerset Berkley Regional High School was a victim of a ransom-ware attack, according to a letter sent to parents by Superintendent Jeffrey Schoonover. Oh July 17, some high school computer systems were encrypted, which means they could no longer operate. Read more on Taunton Daily Gazette. h/t, @VERISDB

Read more

DLL Fixer leads to Cyrat Ransomware

Posted on September 2, 2020 by Dissent

Karsten Hahn writes about a new ransomware, Cyrat: While hunting for new malware we often use Yara rules to find suspicious samples. One of my generic ransomware hunt rules found this new ransomware sample. At the time it had only 2 detections on Virustotal. The first submission date is 25. August 2020. […] The malware…

Read more

OH: Mansfield City Schools: No personal data compromised during cyber attack

Posted on September 1, 2020 by Dissent

Katie Ellington reports:  No “personal information” was accessed during a recent cyber attack on Mansfield City Schools, according to superintendent Stan Jefferson. Jefferson sent a letter to staff and district families Tuesday morning addressing the incident. “We want to assure you that we successfully contained the threat and at no time was any of the…

Read more

Amphastar Pharmaceuticals discovers that threat actors had exfiltrated employee data in May ransomware attack

Posted on August 31, 2020 by Dissent

On July 21, the DoppelPaymer ransomware threat actors added Amphastar Pharmaceuticals to their leak list. They also uploaded a number of files as proof of access and exfiltration.  It was because of that listing that Amphastar eventually discovered that employee data had been stolen in a May attack. On August 27, Amphastar sent notification letters…

Read more
  • Previous
  • 1
  • …
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.