Brian Krebs reports: It’s bad enough that many ransomware gangs now have blogs where they publish data stolen from companies that refuse to make an extortion payment. Now, one crime group has started using hacked Facebook accounts to run ads publicly pressuring their ransomware victims into paying up. Read more on KrebsOnSecurity.com. The Ragnar Locker threat actors…
Melbourne firm denies data stolen during ransomware attack
Sam Varghese reports: A Melbourne firm which suffered a hit from cyber criminals using the Windows REvil ransomware has denied that any data was exfiltrated from its site, as was reported in these columns. A spokesperson from Nexia Australia and New Zealand, a network of solutions-focused accountancy and consultancy firms, said the attack had taken…
Damien Bancal
Damien Bancal reports (translation follows): I revealed to you, last November 3, the announced piracy of the pharmaceutical laboratory Expanscience (Mustela…). A second cyberattack, in four months, posted by a group of ransomware operators. After Maze , Egregor explained that he had invited himself to the company’s IT. On November 9, I discovered that the Bailly Creat lab, a French pharmaceutical laboratory specializing…
GA: JIA sends notices to those potentially affected by ransomware attack
Lauren McDonald reports: Jekyll Island Authority has sent notices to individuals whose data may have been compromised in a recent ransomware attack. The hackers could have had access to data affecting more than 7,000 individuals and companies who do business with the authority, according to a post on JIA’s website offering an update on the…
Privacy Commission probes suspected LTO data leak
Melissa Luz Lopez reports: The National Privacy Commission is investigating a suspected data leak involving car registrations under the Land Transportation Office. In a statement, the privacy body said it is looking into the data available on lisensya.info, which has a “Motor Vehicle Authenticator” that reveals the car make, plate and engine number, registration expiry date,…
PROOF POINTS: What happens when private student information leaks
Drawing upon the incredible work of Doug Levin and his K-12 Cybersecurity Resource Center, Jill Barshay of The Hechinger Report highlights some of Doug’s findings — findings the GAO relied heavily upon in their recent report. How you tabulate breaches can make a huge difference in the public’s — and Congress’s — understanding of the…