Adele Ferguson and Chris Gillett report on documents leaked by a whistleblower: Leaked documents obtained by 7.30, The Age and The Sydney Morning Herald reveal the Chinese-owned energy giant does not appear to have proper systems in place to protect sensitive customer information. Through its retail operations Alinta collects names, addresses, birth dates, mobile numbers,…
Hit with ransomware, Prince Edward Island notifies residents and continues recovery efforts
Earlier today, Maze Team added Prince Edward Island (PEI) to their website where they list victims who have refused to pay their ransom demands. As they have done in other cases, the attackers also provided some files that they exfiltrated as proof. In looking into this attack, DataBreaches.net found that PEI had issued a statement…
(UPDATED) Texas bank attacked with DoppelPaymer ransomware — attackers’ report
Update 2: The attackers have confirmed that they had named the wrong bank and that the victim bank is Community Development Bank (in Minnesota). UPDATE 1: Amanda Tavackoli SVP, Communication for TBK Bank has responded with the following statement: I’m responding to your request for information regarding the DoppelPaymer claim. Reports that CD Bank has…
GA: Records reveal City of Cartersville paid ransomware attackers $380K
James Swift reports: On May 6, 2019, the City of Cartersville alerted residents that the local government had fallen prey to a ransomware attack. Yet since then, details on the size, scope and severity of the cybersecurity breach have remained scarce. City officials broke their nearly yearlong silence on the cyberattack, however, in the wake of…
The RNC stopped paying a data firm after a serious breach — then paid a mysterious LLC with the same address
The RNC Stopped Paying a Data Firm After A Serious Breach. Then It Paid A Mysterious LLC With the Same Address. Three years after the Republican National Committee publicly sidelined the sullied firm, it paid an LLC with the same address $900,000 for “data services.” The RNC said it wouldn’t “waste any more breath explaining…
Meet the white-hat group fighting Emotet, the world’s most dangerous malware
Catalin Cimpanu reports: For more than a year, a group of security researchers and system administrators have banded together to fight back against Emotet, today’s most active and dangerous malware operation. By working together, the Cryptolaemus group has seriously hindered Emotet operations. Daily, the group publishes updates on its website and Twitter account. They share so-called indicators of…