Categories
2023 HOT News-EN

HACKS OF TODAY 28/04/2023

news

HACKS OF TODAY 28/04/2023

Today’s HOT includes 11 ransomware victims of the notorious KaraKurt, BlackCat/ALPHV, BlackBasta, Akira, AvosLocker and Cl0p gangs.

The average Cyber Risk Factor of the day is 3.5.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

HWL EBSWORTH

Victim website:

hwlebsworth.com.au

Victim country:

Australia

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

4 TB

Exfiltrated data type:

Internal Company Data (Employees personal data, CV’s, DL’s, ID’s, SSN’s, Financial reports, Accounting data, Loans data, Insurance, Agreements and much more); – Clients documentation (DL’s, ID’s, SSN’s, Financial data, Credit cards information, Loans data, Agreements and much more); – Complete network map including credentials for local and remote services etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

LA RED HEALTH CENTER

Victim website:

laredhealthcenter.org

Victim country:

USA

Attacker name:

KaraKurt

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

79 GB

Exfiltrated data type:

Financial documents, medical records with diagnosis, their employee and students personal information.

Leaked data:

/

Ransom deadline:

02nd May 23

Cyber Risk Factor:

4

GREAT CONNECTIONS

Victim website:

gc-employment.com

Victim country:

Canada

Attacker name:

Cl0p

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous including social security numbers, client’s information and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

PEMBINA COUNTY MEMORIAL HOSPITAL

Victim website:

cavalierhospital.com

Victim country:

USA

Attacker name:

AvosLocker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

NDA’s, Database dump containing information about each patient and employer (previous and current) (MSSQL: Angus, Conversion_Centriq), HR, Board, Policies

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

DIJONES REAL ESTATE

Victim website:

dijones.com.au

Victim country:

Australia

Attacker name:

AvosLocker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

125 GB

Exfiltrated data type:

Miscellaneous including Payroll, HR, Marketing, Finance

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

03rd May 23

Cyber Risk Factor:

4

MASTERCORP

Victim website:

mastercorp.com

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

ANTON PAAR

Victim website:

anton-paar.com

Victim country:

Austria

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including insurance and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

SMITH & SHARP

Victim website:

feesmith.com

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Clients’ private information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

VMEDIA

Victim website:

vmedia.ca

Victim country:

Canada

Attacker name:

AvosLocker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

SUNPOWER

Victim website:

sunpowermarine.com

Victim country:

USA

Attacker name:

AvosLocker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

LARAGH COURSEWARE

Victim website:

laragh.com

Victim country:

South Africa

Attacker name:

AvosLocker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

Stay safe!

Hackmanac Team

Latest news

Categories
2023 HOT News-EN

HACKS OF TODAY 27/04/2023

news

HACKS OF TODAY 27/04/2023

Today’s HOT includes 19 ransomware victims of the notorious LockBit 3.0, BlackCat/ALPHV, RansomHouse, BlackBasta, Medusa and Akira gangs.

The average Cyber Risk Factor of the day is 3.0.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

MULTIMEDICA GROUP

Victim website:

multimedica.it

Victim country:

Italy

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A (ransomware caused severe hospital outage)

Leaked data:

/

Ransom deadline:

30th Apr 23

Cyber Risk Factor:

5

FUNDAÇÃO CARLOS CHAGAS

Victim website:

concursosfcc.com.br

Victim country:

Brazil

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous including confidential and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

OMT OFFICINE MECCANICHE TORINO S.P.A.

Victim website:

omt-torino.com

Victim country:

Italy

Attacker name:

RansomHouse

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

200 GB

Exfiltrated data type:

Miscellaneous including clients data, credentials, financial, confidential documents

Leaked data:

Sample with several downloadable folders as a proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

TRANZTEC SOLUTIONS

Victim website:

tranztec.com

Victim country:

USA

Attacker name:

RansomHouse

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

70 GB

Exfiltrated data type:

Miscellaneous including financial, contacts, customers, passwords and vendors documents

Leaked data:

Sample with several downloadable folders as a proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

COACHCOMM

Victim website:

coachcomm.com

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous including database, customers, emails, employees, HR, financial documents

Leaked data:

Sample with proof of the exfiltrated documents

Ransom deadline:

N/A

Cyber Risk Factor:

4

ALLIANCE SPORTS GROUP

Victim website:

new.alliancesportsgroup.net

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Accounting, finance, legal, insurance, HR, operations etc.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

SETTLEMENT MUSIC SCHOOL

Victim website:

settlementmusic.org

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Documents of teachers, parents, employees. Financial reports and other numerous internal documents

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

SCHOTTENSTEIN PROPERTY GROUP

Victim website:

spgroup.com

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Corporate and personal information of customers

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

THOMPSON BUILDERS

Victim website:

tbcorp.com

Victim country:

Canada

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Corporate data (accounting, information, business contracts and much other including personal data of their employees)

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

ROCKBRIDGE CAPITAL

Victim website:

rockbridgecapital.com

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

40 GB

Exfiltrated data type:

Business information: numerous contracts, projects, business contacts, detailed and personal employees information, confidential documents etc.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

FAMILY DAY CARE SERVICES

Victim website:

familydaycare.com

Victim country:

Canada

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Customers’ information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

4LEAF

Victim website:

4leafinc.com

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Clients’ information

Leaked data:

N/A

Ransom deadline:

N/A

Cyber Risk Factor:

3

PAK-RITE

Victim website:

pak-rite.com

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Corporate and personal information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

SILBON

Victim website:

silbon.es

Victim country:

Spain

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

28th Apr 23

Cyber Risk Factor:

2

FINANCIAL SERVICES DEVELOPMENT COUNCIL

Victim website:

fsdc.org.hk

Victim country:

Hong Kong

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

28th Apr 23

Cyber Risk Factor:

2

CDC BME STIHL DISTRIBUTOR

Victim website:

cdcbmestihl.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

28th Apr 23

Cyber Risk Factor:

2

BG2I

Victim website:

bg2i.fr

Victim country:

France

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

28th Apr 23

Cyber Risk Factor:

2

e-HAZARD

Victim website:

e-hazard.com

Victim country:

USA

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

2

ACCESS CONTROL SECURITY

Victim website:

accesscontrolsecurity.com

Victim country:

USA

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

2

Stay safe!

Hackmanac Te

Latest news

Categories
2023 HOT News-EN

HACKS OF TODAY 26/04/2023

news

HACKS OF TODAY 26/04/2023

Today’s HOT includes 24 ransomware victims of the notorious LockBit 3.0, BlackCat/ALPHV, BlackByte, BlackBasta, BianLian and Medusa gangs.

The average Cyber Risk Factor of the day is 3.6.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

GENERAL PLUG & MANUFACTURING

Victim website:

generalplug.com

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

612 GB

Exfiltrated data type:

Projects, accounting, company data, engineering data, top managment mail archives, quickbooks databases

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

BENTHAM & HOLROYD

Victim website:

benthams.com

Victim country:

United Kingdom

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 500,000

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Financial, technical designs, employees’ information, business plans

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

02nd May 23

Cyber Risk Factor:

5

BERNINA INTERNATIONAL AG

Victim website:

bernina.com

Victim country:

Switzerland

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

200 GB

Exfiltrated data type:

Customer data, clients data, employee data, nda-contracts and documents, drawings and developments, bank data and reports, statements, personal data.

(415,000 files were seized, excluding SQL databases.

More than 30 Volumes are encrypted in Cluster Storage.

Offices in Switzerland, Thailand are affected.

The tapes are wiped, the NAS is wiped, found and successfully encrypted 7 Hyper-V.)

Leaked data:

Several samples with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

BILSTEIN GMBH

Victim website:

bilsteingroup.com

Victim country:

Germany

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

60 GB

Exfiltrated data type:

HR, Accounting, Financial data, Projects

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

FALCON EXPRESS TRANSPORTATION

Victim website:

fxtran.com

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

360 GB

Exfiltrated data type:

HR, files from management pc’s, financial data, business data, personal data

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

GROUPE ETIC

Victim website:

etic-groupe.com

Victim country:

France

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

230 GB

Exfiltrated data type:

HR, files from management pc’s, financial data, business data

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

XPRESS CARGO

Victim website:

xpresscargoinc.com

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

400 GB

Exfiltrated data type:

Projects, clients data, financial data, business data, accounting, SQL databases

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

INSTITUT MAROCAIN DE NORMALISATION

Victim website:

imanor.gov.ma

Victim country:

Morocco

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

24th May 23

Cyber Risk Factor:

4

ATLANTIC EYE CENTER OPTICAL

Victim website:

atlanticeye.net

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Full database of the medical records for all patients and data exfiltrated from their file server.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

05th May 23

Cyber Risk Factor:

4

AGENSI KAUNSELING DAN PENGURUSAN KREDIT

Victim website:

akpk.org.my

Victim country:

Malaysia

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

1,500,000 files

Exfiltrated data type:

Miscellaneous including financial and PII documents

Leaked data:

50% of the exfiltrated data

Ransom deadline:

28th Apr 23

Cyber Risk Factor:

4

BEVAN GROUP

Victim website:

bevangroup.com

Victim country:

United Kingdom

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 100,000

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous including financial, technical designs, customer information etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

04th May 23

Cyber Risk Factor:

4

GT GROUP

Victim website:

gtgroupinc.com

Victim country:

Canada

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous documents

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

PEACHTREE MEDICAL CENTER

Victim website:

peachtree-medical.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Full database of the medical records for all patients and data exfiltrated from their file server

Leaked data:

Sample with proof of the exfiltrated documents

Ransom deadline:

05th May 23

Cyber Risk Factor:

4

PHYSICIANS TO WOMEN

Victim website:

ptow.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Full database of the medical records for all patients and data exfiltrated from their file server

Leaked data:

Sample with proof of the exfiltrated documents

Ransom deadline:

05th May 23

Cyber Risk Factor:

4

VIVIEN CHAN & CO

Victim website:

vcclawservices.com

Victim country:

Hong Kong

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

EW WANFRIED

Victim website:

ewwanfried.de

Victim country:

Germany

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

99 GB

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

SUMMER WEINE

Victim website:

summerweine.at

Victim country:

Austria

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

6 GB

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

FABECKARCHITECTS

Victim website:

fabeckarchitectes.lu

Victim country:

Luxembourg

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

77 GB

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

DACOTAH PAPER

Victim website:

dacotahpaper.com

Victim country:

USA

Attacker name:

BlackByte

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

DURO DAKOVIC MONTAZA

Victim website:

ddmontaza.hr

Victim country:

Croatia

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial documents and technical designs

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

LEIN HING GROUP

Victim website:

lhh.com.my

Victim country:

Malaysia

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

SUNNY DESIGNS

Victim website:

sunnydesigns.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Sales database for all customers + data from their file server

Leaked data:

Sample with proof of the exfiltrated documents

Ransom deadline:

05th May 23

Cyber Risk Factor:

3

KEYSTONE SMILES COMMUNITY LEARNING CENTER

Victim website:

keystonesmiles.org

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

15th May 23

Cyber Risk Factor:

2

TRANSFORMATIVE HEALTHCARE

Victim website:

omahath.com

Victim country:

USA

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

2

Stay safe!

Hackmanac Te

Latest news

				
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----