Chris Windeyer reports: A few errant keystrokes by an education department worker exposed the data of more than 500 Yukon students, according to a notification obtained by CBC News. “[T]he breach involves a risk of significant harm to your privacy,” reads the letter to affected students. The letter says names, phone numbers, email addresses, dates…
Correction
On September 20, DataBreaches published a post about an alleged hack of Ask.FM data from what was described as a March, 2020 hack. Ask.FM had not replied to this site’s inquiries by the time of publication. Ask.FM replied today and reminded me that they had addressed this same claimed hack in December 2021 when this…
Hackers steal South Carolina fire department’s paychecks
Bethany Fowler reports: Hackers allegedly stole over $8,000 in paychecks following an email hack from an Upstate fire department. According to the Spartanburg County Sheriff’s Office, deputies responded to the Reidville Fire Department located at 3380 Hwy 417 on a report of fraud/payroll theft. Read more at News2.
Bits ‘n Pieces (Trozos y Piezas)
Cl: Guacamaya Group leaks emails from Joint Chiefs of Staff El Estado Mayor Conjunto De Chile (EMCO), the advisory body of the Chilean Ministry of Defense, was the victim of a data leak. Thousands of emails were leaked online by the hacktivist group, Guacamaya in “Operation Repressive Forces. About 10TB of emails from military and…
Bjorka, the Online Hacker Trying To Take Down the Indonesian Government
Aisyah Llewellyn reports: The first that Indonesia heard about the hacker now known as Bjorka came when news broke at the beginning of September of a massive data leak. Some 1.3 billion SIM card registration details were stolen and listed for sale on a dark web online marketplace. The data was harvested in part as…
Held to Ransom: How Cyberattacks Can Become a Legal and Regulatory Odyssey for a Private Investment Fund
Ryan P. Blaney, Margaret A. Dale, Dorothy Murray, Todd J. Ohlms, and Jonathan M. Weiss of Proskauer write: …. Cyberattacks, by their very nature, know no borders and nor therefore should a private fund’s response The first of this two-part series considers immediate incident response steps and analyses whether to pay a ransom, from U.S.,…