Categories
2023 HOT News-EN

HACKS OF TODAY 03/11/2023

news

HACKS OF TODAY 03/11/2023

Today’s HOT includes 14 ransomware victims by the notorious ALPHV/BlackCat, Play, NoEscape and LockBit 3.0 gangs.

The average Cyber Risk Factor is 4.1.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

HENRY SCHEIN

Victim website:

henryschein.com

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

35 TB

Exfiltrated data type:

Internal payroll data and shareholder folders

Leaked data:

Sample with proof of the exfiltrated data, clients, partners, employee sensitive data

Ransom deadline:

03rd Nov 23

Cyber Risk Factor:

5

SHIMANO

Victim website:

shimano.com

Victim country:

Japan

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

4.5 TB

Exfiltrated data type:

Employees (ID, NRIC, IC No., TIN Number, SSS Number, mail, telephone, residential address, passport scans, contracts marked CONFIDENTIALITY)

Financial documents (balance sheets, budget, PL reports, expense reports, bank statements, accounts payable and receivable reports, various tax forms and reports, audits, cashflow, plans, KPIs and many other important financial documents)

Client database (address, phone number, responsible person), reports, presentations, analytics, internal documents, mail correspondence, results of various meetings, minutes, developments, various confidential reports, sales reports, legal documents, factory inspection results (violations), projects, various reports from production, information about machines (robots), committee results, incident report

NDA, contracts, agreements, various diagrams/drawings marked CONFIDENTIAL, development materials, laboratory tests, tests, Corrective Action Report, many sources and other important documents.

Leaked data:

/

Ransom deadline:

05th Nov 23

Cyber Risk Factor:

5

ALIANZA FRANCESA SCHOOL

Victim website:

lafase.cl

Victim country:

Chile

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

204 GB

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

22nd Nov 23

Cyber Risk Factor:

4

BINDA

Victim website:

bindagroup.com

Victim country:

Italy

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial data, customer details, invoices, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

16th Nov “3

Cyber Risk Factor:

4

RICARDO

Victim website:

ricardo.com

Victim country:

United Kingdom

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients documents, IDs, HR, budget, documentation on subcontracts of military companies and departments of the USA and England, developments and technical documentation, tax, finance information and etc.

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

4

GSP COMPONENTS

Victim website:

gspcomponents.com

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, client documents, HR, budget, tax, finance information and etc.

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

4

NORTH DAKOTA GRAIN INSPECTION

Victim website:

graininspection.com

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, client documents, budget, tax, finance information and etc.

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

4

HILYARD’S BUSINESS SOLUTIONS

Victim website:

hilyards.com

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential information, clients’ documents, HR information, budget details, tax information, finance information, and more.

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

4

JDRM ENGINEERING

Victim website:

jdrm.com

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential information, clients’ documents, HR data, budget information, technical documentation, tax and finance information, and more

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

4

BRY-AIR

Victim website:

bry-air.com

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential information, clients’ documents, IDs, HR, budget, tax, and finance information

Leaked data:

/

Ransom deadline:

04th Nov 23

Cyber Risk Factor:

4

AGILE DISPLAY SOLUTIONS

Victim website:

agiledisplaysolutions.com

Victim country:

Taiwan

Attacker name:

NoEscape

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

18 GB

Exfiltrated data type:

SQL Backup, Confidential documents,

Contracts and agreements,

Banking, finance, payments, transfers,

Activity reports related to company activities,

Data on suppliers, and personal data of employees, as well as thousands of other important company documents.

Leaked data:

/

Ransom deadline:

13th Nov 23

Cyber Risk Factor:

4

LABOR FORCE

Victim website:

laborforce.com

Victim country:

USA

Attacker name:

NoEscape

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

5 GB

Exfiltrated data type:

Personal data of employees, budget, insurance, leadership, audit, agreement, confidential documents, etc.

Leaked data:

/

Ransom deadline:

11th Nov 23

Cyber Risk Factor:

4

MICROTRAIN TECHNOLOGIES

Victim website:

microtrain.net

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

27 GB

Exfiltrated data type:

Enrollment forms, business transactions, agreements, invoices, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

22nd Nov 23

Cyber Risk Factor:

4

CRAFT-MAID KITCHENS

Victim website:

craft-maid.com

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential information, clients’ documents, HR information, budget, tax, finance information, and more

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

3


 
Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 23/04/2024

Today's HOT includes 12 ransomware victims by the notorious Medusa, Abyss, RansomHouse, Cactus, RansomHub, BianLian, Qilin and Qiulong gangs. The average Cyber Risk Factor is  4.5. Read below...

Read More

HACKS OF TODAY 20-21-22/04/2024

Today's HOT includes 10 ransomware victims by the notorious 8Base, Medusa, Embargo and Inc Ransom gangs. The average Cyber Risk Factor is  3.9. Read below the full list.

Read More

HACKS OF TODAY 13-14-15/04/2024

Today's HOT includes 24 ransomware victims by the notorious Hunters International, LockBit 3.0, Daixin, Medusa, ThreeAM, Black Suit, DragonForce, 8Base, Akira and DarkVault gangs. The average Cyber...

Read More
Categories
2023 HOT News-EN

HACKS OF TODAY 02/11/2023

news

HACKS OF TODAY 02/11/2023

Today’s HOT includes 20 ransomware victims by the notorious Daixin, NoEscape, Medusa, 8Base, Rhysida, BlackBasta, ALPHV/BlackCat, Black Suit, Snatch and LockBit 3.0 gangs.

The average Cyber Risk Factor is 3.9.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

BLUEWATER HEALTH

Victim website:

bluewaterhealth.ca

Victim country:

Canada

Attacker name:

Daixin

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

160 GB

Exfiltrated data type:

5.6 million records containing PII and PHI information, 160 GB of sensitive documents, which include scanned copies of personal and health information.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

5

R N WOOLER

Victim website:

rnwooler.co.uk

Victim country:

United Kingdom

Attacker name:

NoEscape

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

840 GB

Exfiltrated data type:

Almost a million documents of thousands of people

Leaked data:

/

Ransom deadline:

12th Nov 23

Cyber Risk Factor:

5

SOFTWARE SYSTEMS

Victim website:

softwaresysinc.com

Victim country:

USA

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 100,000

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial documents

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

09th Nov 23

Cyber Risk Factor:

4

IMPREX

Victim website:

imprex.es

Victim country:

Spain

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including employees’ data, customers, marketing, financial, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

4

KIT PROFESSIONALS

Victim website:

kitprofs.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including letters, confidential documents, technical designs, employees’ data, backups, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

4

HBLFA RAUMBERG-GUMPENSTEIN

Victim website:

raumberg-gumpenstein.at

Victim country:

Austria

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including financial data, invoices, customers’ documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

4

DIVISION 5

Victim website:

steelofcarolina.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including employees’ details, backups, financial documents, accounting and insurance, certificates, technical designs, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

4

VITA RESEARCH

Victim website:

vitaresearch.com

Victim country:

Italy

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Banking data, contracts, and a screenshot showing the exfiltration of administrative documents, legal papers, co-owned cards, and more.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

4

DE GREGORIS

Victim website:

degregoris.com

Victim country:

Italy

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, legal documents, login credentials for the Agenzia delle Entrate portal, customer information, banking data, and more.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

4

SCHWOB AG

Victim website:

schwob.swiss

Victim country:

Switzerland

Attacker name:

NoEscape

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

238 GB

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

07th Nov 23

Cyber Risk Factor:

4

GROUPE FAUBOURG

Victim website:

groupe-faubourg.com

Victim country:

France

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, receipts, accounting documents, personal data, certificates, employment contracts, confidentiality information, personal files etc.

Leaked data:

/

Ransom deadline:

08th Nov 23

Cyber Risk Factor:

4

GO HANDELSSCHOOL AALST

Victim website:

handelsschoolaalst.be

Victim country:

Belgium

Attacker name:

Rhysida

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

114 GB

Exfiltrated data type:

N/A

Leaked data:

100% of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

EMPRESAS IMAN

Victim website:

imancorp.es

Victim country:

Spain

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous documents including passports

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

AF SUPPLY

Victim website:

afsupply.com

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Financial, insurance, medical, court, and other documents.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

HAL ALLERGY

Victim website:

hal-allergy.com

Victim country:

Netherlands

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

62.4 MB

Exfiltrated data type:

Invoices and EU Plans

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

CONTACT COTTRELL AND MCCULLOUGH

Victim website:

cottrelldental.com

Victim country:

US

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

HAWKEYE AREA COMMUNITY ACTION PROGRAM

Victim website:

hacap.org

Victim country:

USA

Attacker name:

Black Suit

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

SAN MIGUEL CORPORATION

Victim website:

sanmiguel.com.ph

Victim country:

Philippines

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

N/A

Ransom deadline:

15th Nov 23

Cyber Risk Factor:

3

DETROIT SYMPHONY ORCHESTRA

Victim website:

dso.org

Victim country:

USA

Attacker name:

Snatch

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

PSMI (PRODUCTION SERVICES MANAGEMENT)

Victim website:

psmicorp.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

22nd Nov 23

Cyber Risk Factor:

3

 Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 23/04/2024

Today's HOT includes 12 ransomware victims by the notorious Medusa, Abyss, RansomHouse, Cactus, RansomHub, BianLian, Qilin and Qiulong gangs. The average Cyber Risk Factor is  4.5. Read below...

Read More

HACKS OF TODAY 20-21-22/04/2024

Today's HOT includes 10 ransomware victims by the notorious 8Base, Medusa, Embargo and Inc Ransom gangs. The average Cyber Risk Factor is  3.9. Read below the full list.

Read More

HACKS OF TODAY 13-14-15/04/2024

Today's HOT includes 24 ransomware victims by the notorious Hunters International, LockBit 3.0, Daixin, Medusa, ThreeAM, Black Suit, DragonForce, 8Base, Akira and DarkVault gangs. The average Cyber...

Read More
Categories
2023 HOT News-EN

HACKS OF TODAY 01/11/2023

news

HACKS OF TODAY 01/11/2023

Today’s HOT includes 21 ransomware victims by the notorious BianLian, Akira, INC Ransom, NoEscape, 8Base, Metaencryptor, BlackBasta, ALPHV/BlackCat, Cl0p and LockBit 3.0 gangs.

The average Cyber Risk Factor is 4.0.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

AUSWIDE SERVICES

Victim website:

auswideservices.net

Victim country:

Australia

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

2.5 TB

Exfiltrated data type:

Personal information, accounting and financial data, contract information, files from the CFO’s computer, operational and business files, as well as email and message archives, belonging to Auswide Services and other Australian companies

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

5

SMARTUI

Victim website:

smartuigroup.com.au

Victim country:

Australia

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including invoices and financial documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

20th Nov 23

Cyber Risk Factor:

4

PRASAN ENTERPRISES

Victim website:

prasan.net

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

687 GB

Exfiltrated data type:

Personal data, accounting information, financial data, contract data, files from the CFO’s PC, operational and business files, and clients’ personal information

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

AGEROUTE SENEGAL

Victim website:

ageroute.sn

Victim country:

Senegal

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

121 GB

Exfiltrated data type:

Miscellaneous including financial, invoices and PII documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

20th Nov 23

Cyber Risk Factor:

4

ABU DHABI NATIONAL COMPANY FOR BUILDING MATERIALS

Victim website:

bildco.ae

Victim country:

UAE

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

52 GB

Exfiltrated data type:

Employees’ data, financial documents, invoices, confidential documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

20th Nov 23

Cyber Risk Factor:

4

RIO HONDO COLLEGE

Victim website:

riohondo.edu

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Confidential documents, passports, employees’ data, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

20th Nov 23

Cyber Risk Factor:

4

PATRIOTISK SELSKAB

Victim website:

patriotisk.dk

Victim country:

Denmark

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

European personal documents, confidential agreements, and other papers

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

UNIVERSAL SEWING SUPPLY

Victim website:

universalsewing.com

Victim country:

USA

Attacker name:

INC Ransom

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, certificates of organization and liability insurance, and sales invoices

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

VINOVALIE

Victim website:

vinovalie.com

Victim country:

France

Attacker name:

NoEscape

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

500 GB

Exfiltrated data type:

Confidential and critical data from the company’s servers

Leaked data:

/

Ransom deadline:

03rd Nov 23

Cyber Risk Factor:

4

SCHOLER FORDERTECHNIK

Victim website:

schoeler-gabelstapler.de

Victim country:

Germany

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, receipts, accounting documents, personal data certificates, employment contracts, confidential information, confidentiality agreements, and personal files

Leaked data:

/

Ransom deadline:

08th Nov 23

Cyber Risk Factor:

4

JAI A/S

Victim website:

jai.com

Victim country:

Denmark

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, receipts, accounting documents, personal data, certificates, employment contracts, confidential information, confidentiality agreements, and personal files

Leaked data:

/

Ransom deadline:

08th Nov 23

Cyber Risk Factor:

4

ARMSTRONG CONSULTANTS

Victim website:

armstrongconsultants.com

Victim country:

USA

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, receipts, accounting documents, personal data, certificates, employment contracts, confidentiality agreements, and personal files

Leaked data:

/

Ransom deadline:

08th Nov 23

Cyber Risk Factor:

4

TRAXALL FRANCE

Victim website:

traxall.fr

Victim country:

France

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Invoices, receipts, accounting documents, personal data, certificates, employment contracts, confidentiality agreements, and personal files

Leaked data:

/

Ransom deadline:

08th Nov 23

Cyber Risk Factor:

4

TANATEX CHEMICALS

Victim website:

tanatexchemicals.com

Victim country:

Netherlands

Attacker name:

Metaencryptor

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

308 GB

Exfiltrated data type:

Miscellaneous including financial data

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

04th Nov 23

Cyber Risk Factor:

4

GSP LOTEAMENTOS

Victim website:

gsp.com.br

Victim country:

Brazil

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

PII documents, confidential documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

CATHERINE GANNON

Victim website:

gannons.co.uk

Victim country:

United Kingdom

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

PII documents, confidential documents, invoices, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

ADVARRA

Victim website:

advarra.com

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

120 GB

Exfiltrated data type:

Confidential data belonging to Advarra’s customers, patients, and all current and former employees, PII documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

TOWN OF IOWA

Victim website:

iowala.org

Victim country:

USA

Attacker name:

ALPHV/BlackCat

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Miscellaneous including scans, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

N/A

Cyber Risk Factor:

4

SUMMIT HEALTH

Victim website:

summithealth.com

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

08th Nov 23

Cyber Risk Factor:

4

UNITED TRANSFORMERS ELECTRIC COMPANY

Victim website:

utec.com.sa

Victim country:

Saudi Arabia

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

108 GB

Exfiltrated data type:

Miscellaneous including financial data, invoices, financial documents, technical documents, etc.

Leaked data:

Sample with proof of the exfiltrated data

Ransom deadline:

20th Nov 23

Cyber Risk Factor:

4

SWEET LAKE LAND & OIL COMPANY

Victim website:

/

Victim country:

USA

Attacker name:

Cl0p

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

 


Stay safe!

Hackmanac Team

Latest news

HACKS OF TODAY 23/04/2024

Today's HOT includes 12 ransomware victims by the notorious Medusa, Abyss, RansomHouse, Cactus, RansomHub, BianLian, Qilin and Qiulong gangs. The average Cyber Risk Factor is  4.5. Read below...

Read More

HACKS OF TODAY 20-21-22/04/2024

Today's HOT includes 10 ransomware victims by the notorious 8Base, Medusa, Embargo and Inc Ransom gangs. The average Cyber Risk Factor is  3.9. Read below the full list.

Read More

HACKS OF TODAY 13-14-15/04/2024

Today's HOT includes 24 ransomware victims by the notorious Hunters International, LockBit 3.0, Daixin, Medusa, ThreeAM, Black Suit, DragonForce, 8Base, Akira and DarkVault gangs. The average Cyber...

Read More
				
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----