Categories
2023 HOT News-EN

HACKS OF TODAY 30/05/2023

news

HACKS OF TODAY 30/05/2023

Today’s HOT includes 19 victims:

18 ransomware by the notorious LockBit 3.0, BianLian, ALPHV/BlackCat, Qilin, Vice Society, Ra Group, Akira, Play, 8Base and Dunghill Leak gangs and 1 data breach.

The average Cyber Risk Factor is 3.9.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

RETAIL MERCHANT SERVICES

Victim website:

retailmerchantservices.co.uk

Victim country:

United Kingdom

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 5,000,000

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

23rd Jun 23

Cyber Risk Factor:

5

EARLENS CORPORATION

Victim website:

earlens.com

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

1,8 TB

Exfiltrated data type:

HR, accounting, financial data, personal data, top management PC, production technological data, shareholders data

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

INCREDIBLE TECHNOLOGIES

Victim website:

itsgames.com

Victim country:

USA

Attacker name:

Dunghill Leak

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

500 GB

Exfiltrated data type:

Binaries and source files of 58 slot machine games of different versions, documentation to them, with confidential data and calculations of mathematical probabilities, source files for development of applications, drawings, legal documents, data about employees etc.

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

GENTEX CORPORATION

Victim website:

gentex.com

Victim country:

USA

Attacker name:

Dunghill Leak

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

5 TB

Exfiltrated data type:

Databases, engineering, projects, client documents, finance, confidential, legal documents etc

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

ANDRADE GUTIERREZ

Victim website:

andradegutierrez.com.br

Victim country:

Brazil

Attacker name:

Dunghill Leak

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

570 GB

Exfiltrated data type:

187 Projects

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

ZAGOPE – CONSTRUÇÕES E ENGENHARIA S.A

Victim website:

zagope.pt

Victim country:

Portugal

Attacker name:

Dunghill Leak

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

1,5 TB

Exfiltrated data type:

A lot of projects, confidential data, reports, designs etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

CASEPOINT

Victim website:

casepoint.com

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

2 TB

Exfiltrated data type:

Customer’s data

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

NEUTRONIC STAMPING

Victim website:

neutronicstamping.com

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

480 GB

Exfiltrated data type:

HR, accounting, production data, financial data, SQL databases, post archives, company data

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

SMDEA

Victim website:

smdea09.fr

Victim country:

France

Attacker name:

Qilin

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

4,19 GB

Exfiltrated data type:

N/A

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

BC ATTORNEY

Victim website:

bcattorneys.com

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

390 GB

Exfiltrated data type:

Internal Company Data (Employees personal data, CV’s, DL’s, ID’s, SSN’s, Financial reports, Accounting data, Loans data, Insurance, Agreements and much more); of course it include absolutely and highly confidential data. – Clients documentation (DL’s, ID’s, SSN’s, Financial data, Credit cards information, Loans data, Agreements and much more);

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

ADSBOLL

Victim website:

ads.dk

Victim country:

Denmark

Attacker name:

Vice Society

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Large amount of data

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

EASTERN MEDIA INTERNATIONAL CORPORATION

Victim website:

emic.com.tw

Victim country:

Taiwan

Attacker name:

Ra Group

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

500 GB

Exfiltrated data type:

Miscellaneous including email correspondence (Real Estate Accounting Department

Warehouse Operations Management Division

Warehouse Grain Trading Division etc.)

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

FERSTEN WORLDWIDE

Victim website:

fersten.com

Victim country:

Canada

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Corporate and customer information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

COMPUTER INFORMATION CONCEPTS

Victim website:

cicesp.com

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A (Akira claims responsibility about website disruption)

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

BROKERS TRUST

Victim website:

brokerstrust.ca

Victim country:

Canada

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Personal and business customer information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

IRINOX

Victim website:

irinox.com

Victim country:

Italy

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Low amount of data

Exfiltrated data type:

Miscellaneous documents including Identity cards, passport, clients ‘information

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

SOROC

Victim website:

soroc.com

Victim country:

Canada

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients and employee documents, finance, taxes, and etc.

Leaked data:

/

Ransom deadline:

02nd Jun 23

Cyber Risk Factor:

3

AQUIDNECK CLUB

Victim website:

aquidneckclub.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

18th Jun 23

Cyber Risk Factor:

2

ITALIA MILITARE

Victim website:

italiamilitare.it

Victim country:

Italy

Attacker name:

Fibonacci

Attacker class:

Cybercrime

Attack technique:

Data breach

Ransom demand:

N/A

Exfiltrated data amount:

656 MB

Exfiltrated data type:

Full SQL database with name and emails

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

2

Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 22/05/2024

Today's HOT includes 19 ransomware victims by the notorious Qilin, RansomHub, Embargo, BianLian, Play and LockBit 3.0 gangs. The average Cyber Risk Factor is 3.5. Read...

Read More

HACKS OF TODAY 21/05/2024

Today's HOT includes 20 ransomware victims by the notorious Meow, Medusa, RansomHouse, Hunters International, RansomHub, Akira, BlackBasta, 8Base and INC Ransom gangs. The average Cyber...

Read More

HACKS OF TODAY 16 to 20/05/2024

Today's HOT includes 61 victims by the notorious LockBit 3.0, ThreeAM, Qilin, RansomHub, Snatch, Cactus, Kill Security, DragonForce, Money Message, Hunters International, Cloak, RansomHouse, INC...

Read More
Categories
2023 HOT News-EN

HACKS OF TODAY 27-28-29/05/2023

news

HACKS OF TODAY 27-28-29/05/2023

Today’s HOT includes 13 ransomware victims by the notorious LockBit 3.0, Medusa, Ragnar Locker, Monti, 8Base and Nokoyawa gangs.

The average Cyber Risk Factor is 3.9.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

FIDUAGRARIA

Victim website:

fiduagraria.gov.co

Victim country:

Colombia

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 500,000

Exfiltrated data amount:

Several terabytes of data

Exfiltrated data type:

Miscellaneous documents included projects and backups

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

4th Jun 23

Cyber Risk Factor:

5

UNIVERSAL CRANES

Victim website:

universalcranes.com

Victim country:

Australia

Attacker name:

Ragnar Locker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

239 GB

Exfiltrated data type:

Miscellaneous including customers information, work files, cash balances and loans documents. 10 subsidiaries are involved in the breach.

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

BILGEADAM

Victim website:

bilgeadamtechnologies.com

Victim country:

Turkey

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 1,000,000

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

06th Jun 23

Cyber Risk Factor:

5

FIDUAGRARIA

Victim website:

fiduagraria.gov.co

Victim country:

Colombia

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

244 GB

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

14th Jun 23

Cyber Risk Factor:

4

ARNOLD OIL COMPANY

Victim website:

arnoldoilco.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

159 GB

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th Jun 23

Cyber Risk Factor:

4

WATERSAVERS IRRIGATION

Victim website:

watersaversinc.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

FLOOD LAW

Victim website:

floodlaw.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

308 GB

Exfiltrated data type:

Miscellaneous including confidential and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

14th Jun 23

Cyber Risk Factor:

4

SERVIZI OMNIA

Victim website:

omniaservizi.com

Victim country:

Italy

Attacker name:

Monti

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including clients’ information, sensitive documents, invoices etc.

Leaked data:

File tree as a proof of the exfiltrated data

Ransom deadline:

30th May 23

Cyber Risk Factor:

4

VOYAGEURS DU MONDE

Victim website:

voyageursdumonde.fr

Victim country:

France

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

More than 10 000 client’s passports and tons of confidentially agreements around the world.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

30th May 23

Cyber Risk Factor:

4

GRAN TIERRA ENERGY

Victim website:

grantierra.com

Victim country:

Canada

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

150 GB

Exfiltrated data type:

Passports of directors, employees, company contracts, payments and much more

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

02nd Jun 23

Cyber Risk Factor:

4

AIMTRON

Victim website:

aimtron.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial and PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

14th Jun 23

Cyber Risk Factor:

3

GOOD OIL COMPANY

Victim website:

goodoilcompany.com

Victim country:

USA

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

01st Jun 23

Cyber Risk Factor:

3

ROADIES

Victim website:

roadiesinc.com

Victim country:

USA

Attacker name:

Nokoyawa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

2

Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 22/05/2024

Today's HOT includes 19 ransomware victims by the notorious Qilin, RansomHub, Embargo, BianLian, Play and LockBit 3.0 gangs. The average Cyber Risk Factor is 3.5. Read...

Read More

HACKS OF TODAY 21/05/2024

Today's HOT includes 20 ransomware victims by the notorious Meow, Medusa, RansomHouse, Hunters International, RansomHub, Akira, BlackBasta, 8Base and INC Ransom gangs. The average Cyber...

Read More

HACKS OF TODAY 16 to 20/05/2024

Today's HOT includes 61 victims by the notorious LockBit 3.0, ThreeAM, Qilin, RansomHub, Snatch, Cactus, Kill Security, DragonForce, Money Message, Hunters International, Cloak, RansomHouse, INC...

Read More
Categories
2023 HOT News-EN

HACKS OF TODAY 26/05/2023

news

HACKS OF TODAY 26/05/2023

Today’s HOT includes 19 ransomware victims by the notorious LockBit 3.0, BlackByte, Royal, Medusa, BlackCat/ALPHV and Trigona gangs.

The average Cyber Risk Factor is 3.9.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

NORTON HEALTHCARE

Victim website:

nortonhealthcare.com

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

4,7 TB

Exfiltrated data type:

Miscellaneous data, images belong to all patients, millions of SSN records, 25k Employees information

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

PROCURRI

Victim website:

procurri.com

Victim country:

Singapore

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

21,5 GB

Exfiltrated data type:

Around 200 applications with Parters Confidential data inside – More than 100 private contracts to major companies over the world – Financial and Accounting documents – Full network map of company and many more

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

CITY OF AUGUSTA

Victim website:

augustaga.gov

Victim country:

USA

Attacker name:

BlackByte

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 50,000,000

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous documents

Leaked data:

10 GB of sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

THE BEST CONNECTION

Victim website:

thebestconnection.co.uk

Victim country:

United Kingdom

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

1,4 TB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

WENN TOWNSEND

Victim website:

wenntownsend.co.uk

Victim country:

United Kingdom

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

250 GB

Exfiltrated data type:

Internal Company Data (Employees personal data, CV’s, DL’s, ID’s, SSN’s, Financial reports, Accounting data, Loans data, Insurance, Agreements and much more); of course it include absolutely and highly confidential data. – Clients documentation (DL’s, ID’s, SSN’s, Financial data, Credit cards information, Loans data, Agreements and much more).

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

COLRICH

Victim website:

colrich.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

560 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

HAWORTHTOMPKINS

Victim website:

haworthtompkins.com

Victim country:

United Kingdom

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

100 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

RUHRPUMPEN

Victim website:

ruhrpumpen.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

635 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

GROUPE SOVITRAT INTERIM AND RECRUTEMENT

Victim website:

sovitrat.fr

Victim country:

France

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

158 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

DIRECTVIZ SOLUTIONS

Victim website:

directviz.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

246 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

MITUTOYO

Victim website:

mitutoyo.ch

Victim country:

Switzerland

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

254 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

AFG HOLDINGS

Victim website:

afgholdings.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

319 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

VOLT INFORMATION SCIENCES

Victim website:

volt.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

249 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

MARSHALL CONSTRUCTION

Victim website:

marshallconstruction.co.uk

Victim country:

United Kingdom

Attacker name:

Trigona

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

Current price: $ 67,000

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including asset plans, contracts, financial documents etc.

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

KYOCERA AVX

Victim website:

kyocera-avx.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial and PII documents, technical designs etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

09th Jun 23

Cyber Risk Factor:

3

FAMS

Victim website:

fams.net

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including PII scans

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

09th Jun 23

Cyber Risk Factor:

3

GRANGE PACKING SOLUTIONS

Victim website:

co-pack.co.uk

Victim country:

United Kingdom

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

3 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

BM PRECISION

Victim website:

bmprecision.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

26 GB

Exfiltrated data type:

N/A

Leaked data:

10% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

WIANNO CLUB

Victim website:

wiannoclub.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

N/A

Ransom deadline:

15th Jun 23

Cyber Risk Factor:

2

Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 22/05/2024

Today's HOT includes 19 ransomware victims by the notorious Qilin, RansomHub, Embargo, BianLian, Play and LockBit 3.0 gangs. The average Cyber Risk Factor is 3.5. Read...

Read More

HACKS OF TODAY 21/05/2024

Today's HOT includes 20 ransomware victims by the notorious Meow, Medusa, RansomHouse, Hunters International, RansomHub, Akira, BlackBasta, 8Base and INC Ransom gangs. The average Cyber...

Read More

HACKS OF TODAY 16 to 20/05/2024

Today's HOT includes 61 victims by the notorious LockBit 3.0, ThreeAM, Qilin, RansomHub, Snatch, Cactus, Kill Security, DragonForce, Money Message, Hunters International, Cloak, RansomHouse, INC...

Read More
				
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----