DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Dakota Carrier Network hit by Maze ransomware

Posted on May 3, 2020 by Dissent

Benjamin Freed reports: The company that operates a fiber optic network that supports statewide and local government entities across North Dakota was a victim of a recent ransomware attack that included some of the firm’s files being published on a website that attempts to shame victims into paying. Dakota Carrier Network is a consortium of…

Read more

Update to Maze’s ransomware attack on Hammersmith Medicines Research

Posted on May 1, 2020 by Dissent

On March 21, this site reported that Maze Team had attacked Hammersmith Medicines Research (HMR) in London — a clinical testing firm that conducts early Phase 1 and Phase 2 pharmacological tests. Maze had attacked and locked up their data on March 14, but HMR was reportedly able to quickly restore their ability to function and…

Read more

Maze ransomware operators claim to have stolen millions of credit cards from Banco BCR

Posted on May 1, 2020 by Dissent

Lawrence Abrams reports on a new “press release” from the Maze ransomware operators. The release was posted yesterday and claims that the Maze Team had successfully attacked Banco BCR, the state-owned bank of Costa Rico in August, 2019 The attackers claim that the bank never complied with its obligations to notify other banks and regulators….

Read more

Clop ransomware leaks ExecuPharm’s files after failed ransom

Posted on May 1, 2020 by Dissent

Sergiu Gatlan reports: Clop ransomware leaked files stolen from U.S pharmaceutical company ExecuPharm after ransom negotiations allegedly failed. ExecuPharm is a contract research organization (CRO) that provides clinical research support services to companies from the pharmaceutical industry. The company has more than 18,000 global clinical operational specialists in its network and it is one largest…

Read more

Ca: NTPC website apparently hijacked in what looks like a ransomware attack

Posted on April 30, 2020 by Dissent

Walter Strong reports: The Northwest Territories Power Corporation’s (NTPC) website went down Thursday afternoon, but some pages show what appears to be a ransomware message from unknown hackers. Some visitors to the website myntpc.ntpc.com were greeted with a text page that begins with: “Hi! Your files are encrypted by Netwalker.” Read more on CBC.ca

Read more

Report Finds Ransomware Crews Don’t Leave After Being Paid

Posted on April 30, 2020 by Dissent

Organized crews of cybercriminals that attacked health care organizations and other critical services with ransomware this month kept their access to victims’ networks even after ransoms were paid, new research released by Microsoft Corp. says. In a blog post published Tuesday, Microsoft’s Threat Protection Intelligence Team said it had identified “dozens” of ransomware attacks in the…

Read more
  • Previous
  • 1
  • …
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • …
  • 728
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • ICE takes steps to deport the Australian hacker known as “DR32”
  • Hearing on the Federal Government and AI
  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Decision That Murdered Privacy
  • Hearing on the Federal Government and AI
  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.