DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Ransomware victims are paying out millions a month. One particular version has cost them the most.

Posted on March 2, 2020 by Dissent

Steve Ranger reports: Ransomware victims have paid out more than $140 million to crooks over the last six-and-a-half years, according to calculations by the FBI. […] Ryuk was the leading ransomware variant, generating roughly $61m between February 2018 and October 2019. Crysis/Dharma was the second most lucrative ransomware, generating $24m between November 2016 and November 2019. Third on the…

Read more

Hit with ransomware, Prince Edward Island notifies residents and continues recovery efforts

Posted on March 1, 2020 by Dissent

Earlier today, Maze Team added Prince Edward Island (PEI) to their website where they list victims who have refused to pay their ransom demands. As they have done in other cases, the attackers also provided some files that they exfiltrated as proof. In looking into this attack, DataBreaches.net found that PEI had issued a statement…

Read more

(UPDATED) Texas bank attacked with DoppelPaymer ransomware — attackers’ report

Posted on March 1, 2020 by Dissent

Update 2:  The attackers have confirmed that they had named the wrong bank and that the victim bank is Community Development Bank (in Minnesota). UPDATE 1:  Amanda Tavackoli SVP, Communication for TBK Bank has responded with the following statement: I’m responding to your request for information regarding the DoppelPaymer claim. Reports that CD Bank has…

Read more

GA: Records reveal City of Cartersville paid ransomware attackers $380K

Posted on March 1, 2020 by Dissent

James Swift reports: On May 6, 2019, the City of Cartersville alerted residents that the local government had fallen prey to a ransomware attack. Yet since then, details on the size, scope and severity of the cybersecurity breach have remained scarce. City officials broke their nearly yearlong silence on the cyberattack, however, in the wake of…

Read more

Meet the white-hat group fighting Emotet, the world’s most dangerous malware

Posted on March 1, 2020 by Dissent

Catalin Cimpanu reports: For more than a year, a group of security researchers and system administrators have banded together to fight back against Emotet, today’s most active and dangerous malware operation. By working together, the Cryptolaemus group has seriously hindered Emotet operations. Daily, the group publishes updates on its website and Twitter account. They share so-called indicators of…

Read more

Irish IT group Ergo foils major ransomware attack

Posted on February 29, 2020 by Dissent

Charlie Taylor reports: Irish IT services group Ergo is forecasting further growth as it reported revenues of €85.2 million last year as the company said it recently foiled a major ransomware attack. Ergo said it immediately moved to lock down servers late last Wednesday after becoming aware of a serious security incident. It was able to recover…

Read more
  • Previous
  • 1
  • …
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.