DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

The Post and Courier hacked; Black Suit claims to have 500 GB of data.

Posted on April 17, 2024 by Dissent

The Post and Courier proudly declares itself the main daily newspaper in the South, with a heritage going back to The Courier, founded in 1803, and The Evening Post, founded in 1896. Over its history, The Post and Courier has covered many news stories. But today, they are the story because the Black Suit ransomware gang added the paper to its leak site on April 15. The information below is based on the leak site listing and additional details provided exclusively to DataBreaches.net.

The Attack and Scope

According to the listing, Black Suit breached The Post and Courier’s network “and stayed there for over 2 weeks.”

Black Suit’s spokesperson tells DataBreaches that their group accessed the paper’s system on March 14, gaining access “through unpatched weak spots discovered on one of the company servers.” The spokesperson was unsure whether they had ever been detected but stated that they were never kicked out.

The listing claims that Black Suit exfiltrated 500 GB of data. Although Black Suit initially emerged as a group using encryption, their spokesperson informs DataBreaches that they did not use encryption in this attack.

“The amount of leaked data was above our expectations,” the spokesperson told DataBreaches. Data they claimed to acquire came from The Post and Courier as well as related sites:

  • Aiken SC News
  • Evening Post Industries
  • Evening Post Publishing
  • Evening Post Books
  • Courier Square LLC.
  • Post and Courier Advertising

Black Suit claims to have exfiltrated internal files, subscriber data, and employee data. The information allegedly included employees’ Social Security Numbers, passports, driver’s licenses, and other documents. Subscriber data allegedly includes credit card payment information, postal and email addresses, and contact information.

Proof of Claims

Although there is no proof of claims in the leak site listing, chat logs provided to DataBreaches indicate that Black Suit did acquire data. Black Suit provided a partial tree to the negotiator, who was allowed to request a number of files. The chat logs indicate that the paper’s negotiator subsequently provided a list of requested files from the file tree and later acknowledged and confirmed that Black Suit had provided the requested files. DataBreaches’ skim of the file tree found file names and information that was consistent with Black Suit’s description of the data they exfiltrated.

Negotiations Begin

The day after Post and Courier was accessed, someone representing the paper showed up in chat to begin negotiations. They did not give their name or position.

Chat logs from the last week of March and first week of April reveal that Black Suit initially demanded $1,750,000 ransom. The paper was clear that they couldn’t pay that amount. At one point, the paper’s negotiator claimed their bank denied their application for a loan for the total amount. There was no proof in the chat logs that the paper did apply for a loan. DataBreaches did not attempt to verify their claim.

“It is good to see your aim to find the money, but it seems like you are looking for money in the wrong place,” Black Suit’s negotiator responded to the paper’s claim that the bank had turned down their loan application. “Why do you need that bank loan if you are a part of Evening Post Industries? Your parent company should help you to get out of this situation, because there is a lot of personal data leaked from your network and it would not be good for the Parent company and its investment/real estate business in case the leaked data went public, right?”

On April 6, the paper’s negotiator requested a discount  “as a sign of good faith.” “We don’t want to involve anyone else and would like to keep this as in house as possible. If you lowered your price it would go a long way for us being able to pay it,” the negotiator wrote.

After further discussion, Black Suit agreed to give them a 50% discount, but only if they paid in 48 hours.

Even that amount was still too high. The paper’s negotiator replied, “This is a step in the right direction but we still cant accept, especially within 48 hours. We’re currently discussing our options internally and we’ll advise on what those may be.”

When Black Suit reiterated it would contact the parent company, the paper’s negotiator responded, “The information you have is dated and they’re no longer our parent company. Also, we can’t make a decision because what we want to offer is far less than the $875,000 you’re currently offering and we don’t want to upset you. In addition to that, you gave us 48 hours from yesterday and we thought we had time to figure out what that offer may be. If you begin reaching out to anyone about this incident while we’re trying to figure out a solution with you, we’ll stop responding to this email. Be patient and give us the 48 hours you gave us yesterday to try and figure this out.’

Negotiations End Without Even a Whimper

But that seems to be where negotiations ended without further exchanges or resolution—the 48 hours passed with no offer or further word from the paper.

“The way the Manigault family cares about such sensitive information they have lost makes absolutely no sense. People were about to pay for data protection and never responded since then,” Black Suit’s spokesperson commented to DataBreaches. Although the paper’s parent company is Evening Post Publications Inc., the Manigault family has owned the paper for generations. Pierre Manigault is currently the Chairman of the Board.

“What happened within those 48 hours and why Mr.Manigault changed his mind – that is the question everyone would like to be answered. But for now, it is just another time when rich men are trying to evade punishment for their slopiness,” Black Suit’s spokesperson commented.

Was the paper really about to pay but just changed its mind—or was its negotiator stalling all along? DataBreaches does not know.

DataBreaches emailed The Post and Courier yesterday afternoon. Because no reply was received, a second email was sent to Pierre Manigault and Pamela J. Browning, the latter listed as President and Publisher of the Newspaper Division. Neither has replied by publication.


Related:

  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Business SectorHackU.S.

Post navigation

← Ie: Authorities investigating ransomware attack on charity that works with vulnerable children
Cybersecurity firm suspects Russia-linked hacking group behind cyberattack on Texas water facility →

3 thoughts on “The Post and Courier hacked; Black Suit claims to have 500 GB of data.”

  1. Phil Snead says:
    April 17, 2024 at 10:43 am

    Ah yes cutting edge journalism from the family who brought us Lindsey Graham AGAIN!! in 2022.

  2. James says:
    April 25, 2024 at 4:33 pm

    isn’t this weird they did not publish this in the paper Hmm.

  3. Ellen says:
    April 25, 2024 at 4:38 pm

    The lack of transparency amazes me

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.