Categories
2023 HOT News-EN

HACKS OF TODAY 04/05/2023

news

HACKS OF TODAY 04/05/2023

Today’s HOT includes 24 ransomware victims by the notorious BlackCat/ALPHV, AvosLocker Cl0p, LockBit 3.0, Qilin, Play, BlackBasta, Medusa, Cuba, Monti and Royal gangs.

The average Cyber Risk Factor of the day is 3.7.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

ASL 1 – AVEZZANO SULMONA L’AQUILA

Victim website:

asl1abruzzo.it

Victim country:

Italy

Attacker name:

Monti

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

522 GB (Multiple vulnerabilities allowed the download of data)

Exfiltrated data type:

Data on HIV-positive patients

Leaked data:

Sample with proof of the exfiltrated data.

Ransom deadline:

N/A

Cyber Risk Factor:

5

ALBERT ZIEGLER

Victim website:

ziegler.de

Victim country:

Germany

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data (Multiple vulnerabilities has been exploited)

Exfiltrated data type:

Engineering information, confidential customer and partner data, correspondence with military organizations etc.

Leaked data:

Sample with proof of the exfiltrated data. (Personal and financial information of customers and partners is sold on the black market)

Ransom deadline:

N/A

Cyber Risk Factor:

5

BLUEFIELD COLLEGE

Victim website:

bluefield.edu

Victim country:

USA

Attacker name:

AvosLocker

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

1,2 TB

Exfiltrated data type:

Miscellaneous documents including, photos, employees and students’ information

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

SOUTHERN WEST VIRGINIA COMMUNITY AND TECHNICAL COLLEGE

Victim website:

southernwv.edu

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

14,5 GB

Exfiltrated data type:

Personal information of students and personnel (hundreds of SSNs, medical information and etc.), confidential documents, NDAs and many other.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

LUX AUTOMATION

Victim website:

lux-automation.com

Victim country:

Germany

Attacker name:

Monti

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

366 GB

Exfiltrated data type:

Company data

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

BANCO COMERCIAL DO HUAMBO

Victim website:

bch.co.ao

Victim country:

Angola

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Swift data, Financial info about partners and customers, Credit card data, Personal customer information, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

07th May 23

Cyber Risk Factor:

4

COMMUNE DE SAXON

Victim website:

saxon.ch

Victim country:

Switzerland

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Students personal information, private information, financial documents

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

4

CITY OF LOWELL

Victim website:

lowellma.gov

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, passports, IDs, finance, payroll, departments documents, budget and etc

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

4

MIDWEST TRUCK

Victim website:

midwesttruck.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Corporate data with all the personal (drivers licenses, addresses, phones, passports, SSNs) and business (financial docs, bank statements, incident, contract) information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

THE CROWN PRINCESS MARY CANCER CENTRE

Victim website:

sydneywestcancer.org

Victim country:

Australia

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 100,000

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated documents

Ransom deadline:

12th May 23

Cyber Risk Factor:

4

ID TECH

Victim website:

idtechproducts.com

Victim country:

USA

Attacker name:

Cl0p

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including employees information, technical documents, correspondence etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

GIHEALTHCARE

Victim website:

gihealthcare.com

Victim country:

USA

Attacker name:

Cuba

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Large amount of data

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

FOREST RIDGE

Victim website:

forestridge.com

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

CARRINGTON GROUP

Victim website:

carrington.ca

Victim country:

United Kingdom

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

ZBW NEWS

Victim website:

zbw.eu

Victim country:

Germany

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Employees and customers, contracts, NDAs and even Ukraine conflict predictions and reviews.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

TRIAFLEX

Victim website:

triaflex.at

Victim country:

Austria

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

17th May 23

Cyber Risk Factor:

3

NEGMA BUSINESS SOLUTIONS

Victim website:

negma.net

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, finance, taxes, passports, employee and clients documents

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

3

VOCALCOM

Victim website:

vocalcom.com

Victim country:

France

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, finance, passports, clients data, technical information and etc.

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

3

WOONKRACHT10

Victim website:

woonkracht10.nl

Victim country:

Netherlands

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, finance, passports, contracts, HR and etc

Leaked data:

/

Ransom deadline:

06th May 23

Cyber Risk Factor:

3

GROPPER & NEJAT

Victim website:

groppernejat.com

Victim country:

USA

Attacker name:

Qilin

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

12,21

Exfiltrated data type:

Miscellaneous documents

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

SIVSA

Victim website:

coremain.com

Victim country:

Spain

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, employee and client information

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

3

NOVA GROUP

Victim website:

novagroup.com.au

Victim country:

Australia

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, passports, employee information, technical documentation

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

3

DGC

Victim website:

dgc.se

Victim country:

Sweden

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, finance, taxes, clients and employee information

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

3

LIBRA VIRTUA

Victim website:

libravirtua.hu

Victim country:

Hungary

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, finance, hr, contracts, databases, clients documents and files

Leaked data:

/

Ransom deadline:

11th May 23

Cyber Risk Factor:

3

Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 11-12-13-14-15/05/2024

Today's HOT includes 94 victims by the notorious Hunters International, Rhysida, BianLIan, dAn0n, Qilin, Embargo, Everest, INC Ransom, Black Suit, Monti, Akira, RansomHub, Zero Tolerance...

Read More

HACKS OF TODAY 09-10/05/2024

Today's HOT includes 94 victims by the notorious Hunters International, Rhysida, BianLIan, dAn0n, Qilin, Embargo, Everest, INC Ransom, Black Suit, Monti, Akira, RansomHub, Zero Tolerance...

Read More
Categories
2023 HOT News-EN

HACKS OF TODAY 03/05/2023

news

HACKS OF TODAY 03/05/2023

Today’s HOT includes 11 victims:

10 ransomware by the notorious BlackCat/ALPHV, Cl0p, LockBit 3.0, Snatch, Akira and BlackBasta gangs and 1 data breach by RansomHouse.

The average Cyber Risk Factor of the day is 3.7.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

CLOUD 51 DATA SOLUTIONS

Victim website:

cloud51.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

60 companies that Cloud51 serves, have all been hacked. Each company had all their confidential files, financial documents, employees, customers, suppliers downloaded. Copies of passports, SSN, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

09th May 23

Cyber Risk Factor:

5

BAY CREST

Victim website:

baycrestpartners.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 1,000,000

Exfiltrated data amount:

18 GB

Exfiltrated data type:

SQL databases and mail backups

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

23rd May 23

Cyber Risk Factor:

5

MY SIMPLY GREEN

Victim website:

mysimplygreen.com

Victim country:

Canada

Attacker name:

Cl0p

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

1,69 TB

Exfiltrated data type:

Miscellaneous including financial, contracts, non-disclosure and confidential documents.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

AECO SENSOR

Victim website:

aecosensors.com

Victim country:

Italy

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Financial and Accounting Documents – Databases – Confidential documents of clients and partners – Contracts and other documents – engineering information. (Huge number of vulnerabilities exploited)

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

06th May 23

Cyber Risk Factor:

5

AMERICAN FOAM & PACKAGING

Victim website:

amfoaminc.com

Victim country:

USA

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

750 GB

Exfiltrated data type:

Company data

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

AVIDXCHANGE

Victim website:

avidxchange.com

Victim country:

USA

Attacker name:

RansomHouse

Attacker class:

Cybercrime

Attack technique:

Data breach

Ransom demand:

N/A

Exfiltrated data amount:

450 GB

Exfiltrated data type:

Miscellaneous documents including employees’ information

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

HASENAUER

Victim website:

hasenauer-anlagenbau.at

Victim country:

Austria

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th May 23

Cyber Risk Factor:

3

CYDSA

Victim website:

cydsa.com

Victim country:

Mexico

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous documents including directory of supervisors, rio becerra telephone directory, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

08th May 23

Cyber Risk Factor:

3

BRIDGEVALLEY COMMUNITY & TECHNICAL

Victim website:

bridgevalley.edu

Victim country:

USA

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Students personal information, private information, financial documents

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

LINCOLN WOOD PRODUCTS

Victim website:

lincolnwindows.com

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

2

LAWRENCE FAMILY DEVELOPMENT CHARTER SCHOOL

Victim website:

lfdcs.org

Victim country:

USA

Attacker name:

Snatch

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

2

Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 11-12-13-14-15/05/2024

Today's HOT includes 94 victims by the notorious Hunters International, Rhysida, BianLIan, dAn0n, Qilin, Embargo, Everest, INC Ransom, Black Suit, Monti, Akira, RansomHub, Zero Tolerance...

Read More

HACKS OF TODAY 09-10/05/2024

Today's HOT includes 94 victims by the notorious Hunters International, Rhysida, BianLIan, dAn0n, Qilin, Embargo, Everest, INC Ransom, Black Suit, Monti, Akira, RansomHub, Zero Tolerance...

Read More
Categories
2023 HOT News-EN

HACKS OF TODAY 02/05/2023

news

HACKS OF TODAY 02/05/2023

Today’s HOT includes 9 ransomware victims of the notorious Vice Society, BlackCat/ALPHV, Royal and Medusa gangs.

The average Cyber Risk Factor of the day is 4.0.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

EIRMED DEVICES

Victim website:

trelleborg.com

Victim country:

USA

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

200 GB

Exfiltrated data type:

Miscellaneous documents. (BitDefender antivirus was disabled, the company’s infrastructure was completely compromised. Two Daily NAS, local backup storage, and three ESXI servers are encrypted.)

Leaked data:

1. Partial listing of files 1 used in communication 2. Listing half of the files downloaded from the company 3. Random samples of files in the form of an archive 3. Internal documents of the company, including Trelleborg 4. Contact details of employees 5. Company passwords 6. Excerpt from communication with the company in the chat.

Ransom deadline:

04th May 23

Cyber Risk Factor:

5

ALTO CALORE SERVIZI S.P.A.

Victim website:

altocalore.it

Victim country:

Italy

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 100,000

Exfiltrated data amount:

Terabytes of data

Exfiltrated data type:

Miscellaneous including contracts, projects backups etc.

Leaked data:

Sample with file tree as a proof of the exfiltrated data

Ransom deadline:

10th May 23

Cyber Risk Factor:

5

POLAT YOL YAP

Victim website:

polatyol.com

Victim country:

Turkey

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 900,000

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous including PII documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

10th May 23

Cyber Risk Factor:

5

MONTANA STATE UNIVERSITY

Victim website:

montana.edu

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

105 GB

Exfiltrated data type:

Personal data, numerous financial and administrative documents, students’ personal and medical information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

BRIGHTON HILL COMMUNITY SCHOOL

Victim website:

brightonhill.hants.sch.uk

Victim country:

United Kingdom

Attacker name:

Vice Society

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

Large amount of data

Exfiltrated data type:

Miscellaneous documents including HR, Insurance, credit cards etc.

Leaked data:

Sample with several downloadable folders as a proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

AMBIT

Victim website:

ambit.co

Victim country:

India

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

500 GB

Exfiltrated data type:

Company data including scans of Aadhar card, application forms, account statements, email, etc

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

EDISONLEARNING

Victim website:

edisonlearning.com

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

20 GB

Exfiltrated data type:

Organization data including personal information of employees and students

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

TONY CLARK CONSULTING

Victim website:

tclarkconsulting.com

Victim country:

USA

Attacker name:

BlackCat/ALPHV

Attacker class:

Cybercrime

Attack technique:

Data breach

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Confidential data of the company and its customers

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

3

GREAT FALLS COLLEGE OF TECHNOLOGY

Victim website:

gfcmsu.edu

Victim country:

USA

Attacker name:

Royal

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Internal information of this college is interested as a detailed description of inner operations

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 11-12-13-14-15/05/2024

Today's HOT includes 94 victims by the notorious Hunters International, Rhysida, BianLIan, dAn0n, Qilin, Embargo, Everest, INC Ransom, Black Suit, Monti, Akira, RansomHub, Zero Tolerance...

Read More

HACKS OF TODAY 09-10/05/2024

Today's HOT includes 94 victims by the notorious Hunters International, Rhysida, BianLIan, dAn0n, Qilin, Embargo, Everest, INC Ransom, Black Suit, Monti, Akira, RansomHub, Zero Tolerance...

Read More
				
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----