DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Why weren’t patients told that their data was dumped publicly?

Posted on June 19, 2020 by Dissent

On May 13, DataBreaches.net reported that Ako ransomware operators revealed that they had attacked North Shore Pain Management in Massachusetts. The threat actors announced the attack and dumped some of the practice’s files when the medical practice did not pay their ransom demand. The data dump, consisting of more than 4 GB of more than…

Read more

UCSF updates progress recovering from ransomware attack

Posted on June 19, 2020 by Dissent

On June 4, I noted that NetWalker ransomware operators had reportedly added the University of California at San Francisco to their website where they name victims who have not paid their ransom demands. When I checked back today, I do not see UCSF still listed on NetWalker’s site, which is curious. But I also see…

Read more

Pennsylvania health system hit by NetWalker ransomware

Posted on June 19, 2020 by Dissent

NetWalker ransomware operators have added Crozer-Keystone Health System to their list of victims who have not paid their ransom demands. In a post on the threat actors’ website today, they note that they  will start dumping data in six days if the Pennsylvania-based health system does not meet their demands. Their public threat does not…

Read more

Care New England website remains down; no evidence found of data exfiltration

Posted on June 18, 2020 by Dissent

Brian Amaral provides an update on what sounds like a ransomware attack: Care New England’s investigation into ongoing IT problems hasn’t turned up any evidence of unauthorized access to patient information, the nonprofit’s president and CEO said Wednesday. Dr. James Fanale said Care New England, which includes Kent Hospital, Women & Infants Hospital and Butler…

Read more

Cognizant reports the April ransomware attack to California

Posted on June 18, 2020 by Dissent

Lawrence Abrams reports: On April 17th, Cognizant began emailing their clients to warn them that they were under attack by the Maze Ransomware so that they could disconnect themselves from Cognizant and protect themselves from possibly being affected. This email also contained indicators of compromise that included IP addresses utilized by Maze and file hashes for the kepstl32.dll,…

Read more

OR: Keizer city computers hacked and ransomed for $48,000

Posted on June 17, 2020 by Dissent

Eric A. Howald reports: The city of Keizer’s computer system was hacked on Wednesday, June 10, and officials were only able to regain access to the data by paying the perpetrators a $48,000 ransom. At this point, no sensitive data appears to have been accessed or misused. Read more on The Keizer Times.

Read more
  • Previous
  • 1
  • …
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.