Categories
2023 HOT News-EN

HACK TUESDAY WEEK 21-28 MAY 2024

news

HACK TUESDAY WEeK 21-28 MAY 2024

The Hack Tuesday week 21-28 May 2024 includes 68 ransomware victims by the Play, INC Ransom, RansomHub, RansomHouse, Akira, BianLian, Rhysida, dAn0n, Qilin. Eraleig/APT73, Black Suit, Mallox, Monti, Space Bears, 8Base, Medusa and LockBit 3.0 gangs.

The most active ransomware group this week has been LockBit 3.0 with 14 claimed attacks, while the United States accounts for 47% of the victims.

The average Cyber Risk Factor is 4.0.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk Factor (CRF) is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

DATEATTACKERVICTIMCOUNTRYCRF
22/05/24PlayRyder Scott🇺🇸4
22/05/24PlayTri State General Contractors🇺🇸3
22/05/24PlayDistrict Office in Świebodzin🇵🇱4
22/05/24PlayAspire Tax🇺🇸4
22/05/24PlayThe Louis G Freeman🇺🇸3
22/05/24PlayExperis Technology Group🇺🇸4
22/05/24PlayAnchorage Daily News🇺🇸4
22/05/24PlayRDI-USA🇺🇸3
22/05/24PlayArdenbrook🇺🇸3
22/05/24PlayVisa Lighting🇺🇸3
22/05/24PlaySemicore Equipment🇺🇸3
22/05/24PlayLevin Porter Associates🇺🇸3
22/05/24INC RansomFirst Nations Health Authority🇨🇦5
23/05/24RansomHubISETA-ECA🇫🇷4
22/05/24RansomHouseCressex Community School🇬🇧4
22/05/24INC RansomMidwest Covenant Home🇺🇸4
22/05/24RansomHouseHedbergs AB🇸🇪4
22/05/24INC RansomRichland City Hall🇺🇸4
22/05/24AkiraNewman Ferrara🇺🇸4
22/05/24AkiraIZOMAT stavebniny🇨🇿4
22/05/24AkiraGranville Food Care Limited🇮🇪4
22/05/24BianLianNutec Group🇲🇽4
22/05/24RhysidaICC Corporation🇺🇸5
23/05/24INC RansomHands🇨🇦4
23/05/24dAn0nS&F Concrete Contractors🇺🇸5
23/05/24QilinDataNet🇺🇸3
23/05/24Eraleig/APT73Brightway Consultants🇬🇧4
23/05/24LockBit 3.0Valley Land Title🇺🇸3
23/05/24Black SuitHiawatha Homes🇺🇸4
24/05/24Black SuitSchool District Of Colfax🇺🇸4
24/05/24Black SuitSichuan Dawei Science & Technology🇨🇳5
24/05/24Cl0pEmpire Comfort Systems🇺🇸3
24/05/24LockBit 3.0Kulicke & Soffan🇸🇬5
24/05/24LockBit 3.0Workscapes🇺🇸4
24/05/24AkiraVannguard Utility Partners🇺🇸3
24/05/24Black SuitIpsotek LTD🇬🇧5
24/05/24LockBit 3.0BNS Group🇬🇧5
25/05/24LockBit 3.0Longview & Salmon Creek🇺🇸4
25/05/24LockBit 3.0SYSROAD🇸🇳4
25/05/24LockBit 3.0Highway Infrastructure Trust🇮🇳4
25/05/24LockBit 3.0CAFÉS NOVELL🇪🇸4
25/05/24LockBit 3.0Sun Petrochemicals🇮🇳4
25/05/24LockBit 3.0Kharafi Global🇰🇼4
25/05/24LockBit 3.0Municipal Social Welfare Center🇵🇱4
25/05/24LockBit 3.0PressureJet Systems🇮🇳4
25/05/24LockBit 3.0MULTI GROUP🇫🇷4
23/05/24MalloxAssist Informatica🇮🇹3
25/05/24BianLianWindCom🇺🇸4
25/05/24BianLianPayne & Jones🇺🇸5
25/05/24BianLianNational Publisher Services🇺🇸5
26/05/24MontiAeroport de Pau🇫🇷4
26/05/24MontiESC Pau🇫🇷4
26/05/24MontiCNPC Sport🇫🇷4
27/05/24LockBit 3.0Allied Telesis🇺🇸5
27/05/24Space BearsHytera US🇺🇸3
27/05/248BaseShirasaki Corporation🇯🇵3
27/05/248BaseSLB Transit🇨🇦4
27/05/248BaseMatusima Corporation🇯🇵3
27/05/248BaseArchitecture LEJEUNE GIOVANELLI🇧🇪3
27/05/248BaseNatsume🇯🇵4
27/05/248BaseOsaka Motorcycle Business Cooperative🇯🇵4
27/05/248BaseThe Kelly Group🇺🇸4
27/05/24RansomHubChristies Auction House🇬🇧5
27/05/24RansomHubSIAED🇮🇹5
27/05/24MedusaWichita County Mounted Patrol🇺🇸5
27/05/24MedusaBrownell Boat Stands🇺🇸4
28/05/24RansomHubPSG Banatski Dvor D.O.O. Novi Sad🇷🇸4
28/05/24AkiraBrett Slater Solicitors🇦🇺4

Stay safe!

Hackmanac Team!

Latest news

Categories
2023 HOT News-EN

HACKS OF TODAY 22/05/2024

news

HACKS OF TODAY 22/05/2024

Today’s HOT includes 19 ransomware victims by the notorious Qilin, RansomHub, Embargo, BianLian, Play and LockBit 3.0 gangs.

The average Cyber Risk Factor is 3.5.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

LONDON DRUGS

Victim website:

Victim country:

Canada

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 25,000,000

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

23rd May 24

Cyber Risk Factor:

5

Image:

 

GOLDEN ACRE HOME & GARDEN

Victim website:

Victim country:

Canada

Attacker name:

Qilin

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

3

Image:

 

RAMFOAM

Victim website:

Victim country:

United Kingdom

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

24th May 24

Cyber Risk Factor:

3

Image:

 

THROTTLEUP TECHNOLOGIES

Victim website:

Victim country:

USA

Attacker name:

RansomHub

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

65 GB

Exfiltrated data type:

Confidential data

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

SCHMITTY & SONS

Victim website:

Victim country:

USA

Attacker name:

LockBit 3.0

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Tax forms, financial data, PII.

Leaked data:

Sample

Ransom deadline:

31st May 24

Cyber Risk Factor:

4

Image:

 

SHAMROCK TRADING CORPORATION

Victim website:

Victim country:

USA

Attacker name:

Embargo

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

22nd May 24

Cyber Risk Factor:

3

Image:

 

MAH MACHINE

Victim website:

Victim country:

USA

Attacker name:

BianLian

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

227 GB

Exfiltrated data type:

Finance data, HR data, partners’, vendors’, and customers’ data, contracts and agreements, engineering data, images and drawings, and mailboxes with internal and external email correspondence.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

Image:

 

RYDER SCOTT

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, client documents, budgets, payroll, accounting, contracts, taxes, IDs, financial information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

TRI STATE GENERAL CONTRACTORS

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

DISTRICT OFFICE IN ŚWIEBODZIN

Victim website:

Victim country:

Poland

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

ASPIRE TAX

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

THE LOUIS G FREEMAN

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

3

Image:

 

EXPERIS TECHNOLOGY GROUP

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

ANCHORAGE DAILY NEWS

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

RDI-USA

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

3

Image:

 

ARDENBROOK

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

3

Image:

 

VISA LIGHTING

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

SEMICORE EQUIPMENT

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

3

Image:

 

LEVIN PORTER ASSOCIATES

Victim website:

Victim country:

USA

Attacker name:

Play

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Private and personal confidential data, clients’ documents, budget, payroll, accounting, contracts, taxes, IDs, finance information, etc.

Leaked data:

/

Ransom deadline:

28th May 24

Cyber Risk Factor:

3

Image:

 

Stay safe!

Hackmanac Team!

Latest news

Categories
2023 HOT News-EN

HACKS OF TODAY 21/05/2024

news

HACKS OF TODAY 21/05/2024

Today’s HOT includes 20 ransomware victims by the notorious Meow, Medusa, RansomHouse, Hunters International, RansomHub, Akira, BlackBasta, 8Base and INC Ransom gangs.

The average Cyber Risk Factor is 4.6.

Read below the full list.

Disclaimer:

Data are collected from public info published on Dark Web.
The Cyber Risk factor is calculated on cyber attacks’ impact based on available data.

It shows the severity of an event: 1 = low, 5 = critical

REGIONAL OBSTETRICAL CONSULTANTS

Victim website:

Victim country:

USA

Attacker name:

INC Ransom

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Employees’ data, forms, patients’ data, other sensitive documents.

Leaked data:

Sample

Ransom deadline:

N/A

Cyber Risk Factor:

4

Image:

 

GE AEROSPACE

Victim website:

Victim country:

USA

Attacker name:

Meow

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 100,000

Exfiltrated data amount:

N/A

Exfiltrated data type:

SQL Database, 115,000 Clients data, etc.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

5

Image:

 

INTERNATIONAL MODERN HOSPITAL

Victim website:

Victim country:

UAE

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 700,000

Exfiltrated data amount:

1.45 TB

Exfiltrated data type:

Employees’ data, Emirates IDs, scans, backups, and other sensitive data.

Leaked data:

Sample

Ransom deadline:

29th May 24

Cyber Risk Factor:

5

Image:

 

SASKATCHEWAN LIQUOR AND GAMING AUTHORITY

Victim website:

Victim country:

Canada

Attacker name:

RansomHouse

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

2 TB

Exfiltrated data type:

N/A

Leaked data:

Fully published

Ransom deadline:

N/A

Cyber Risk Factor:

5

Image:

 

JEFFERSON CREDIT UNION

Victim website:

Victim country:

USA

Attacker name:

RansomHouse

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

2.0 TB

Exfiltrated data type:

N/A

Leaked data:

Fully published

Ransom deadline:

N/A

Cyber Risk Factor:

5

Image:

 

JPC CONNECTIVITY

Victim website:

Victim country:

Taiwan

Attacker name:

Hunters International

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

435.9 GB (526,194 files)

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

23rd May 24

Cyber Risk Factor:

4

Image:

 

MATADERO DE GIJÓN

Victim website:

Victim country:

Spain

Attacker name:

RansomHub

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

400 GB

Exfiltrated data type:

Access to SCADA control system, encrypted backups.

Leaked data:

Sample

Ransom deadline:

29th May 24

Cyber Risk Factor:

5

Image:

 

AMERICAN CLINICAL SOLUTIONS

Victim website:

Victim country:

USA

Attacker name:

RansomHub

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

700 GB

Exfiltrated data type:

500,000 patients’ data including social security numbers, address, drug tests, medical records, insurance data, etc.

Leaked data:

Sample

Ransom deadline:

25th May 24

Cyber Risk Factor:

5

Image:

 

ORIUX

Victim website:

Victim country:

USA

Attacker name:

RansomHub

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

300 GB

Exfiltrated data type:

Accounting, HR, Financial reports, Clients, Contracts, etc.

Leaked data:

Sample

Ransom deadline:

27th May 24

Cyber Risk Factor:

5

Image:

 

MARIGIN AG

Victim website:

Victim country:

Switzerland

Attacker name:

Akira

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

60 GB

Exfiltrated data type:

Client and employee information, operational information, etc.

Leaked data:

/

Ransom deadline:

N/A

Cyber Risk Factor:

4

Image:

 

AZTEC SERVICES GROUP

Victim website:

Victim country:

USA

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 150,000

Exfiltrated data amount:

398.38 GB

Exfiltrated data type:

Financial data, employees’ data, technical designs, accounting, HR, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

HERAS

Victim website:

Victim country:

United Kingdom

Attacker name:

Medusa

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

$ 1,000,000

Exfiltrated data amount:

393.14 GB

Exfiltrated data type:

Employees’ data, financial data, invoices, design, etc.

Leaked data:

Sample

Ransom deadline:

30th May 24

Cyber Risk Factor:

5

Image:

 

LE VIAN

Victim website:

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

800 GB

Exfiltrated data type:

Accounting, financial data, corporate data, personal documents, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

5

Image:

 

LACTANET

Victim website:

Victim country:

Canada

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

520 GB

Exfiltrated data type:

Corporate data, employees’ data, users’ data, lab data, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

MF GROUP SRL

Victim website:

Victim country:

Italy

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

200 GB

Exfiltrated data type:

Corporate data, users’ confidential data and documents, departments data, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

4

Image:

 

GRUPO CADARSO

Victim website:

Victim country:

Spain

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

570 GB

Exfiltrated data type:

Corporate data, group data, personal users’ data, passports, ID cards, clients’ data, financial documents, confidential data, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

5

Image:

 

ATLAS OIL

Victim website:

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

730 GB

Exfiltrated data type:

Corporate data (accounts, HR, finance, executive), departments data, users and employees’ data, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

5

Image:

 

TRUGREEN

Victim website:

Victim country:

USA

Attacker name:

BlackBasta

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

850 GB

Exfiltrated data type:

Corporate data, personal users’ data, payroll, financial data, etc.

Leaked data:

Sample

Ransom deadline:

28th May 24

Cyber Risk Factor:

5

Image:

 

BRITTANY HORNE

Victim website:

Victim country:

USA

Attacker name:

RansomHub

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

2 GB

Exfiltrated data type:

N/A

Leaked data:

/

Ransom deadline:

26th May 24

Cyber Risk Factor:

3

Image:

 

ALO DIAMONDS

Victim website:

Victim country:

Czech Republic

Attacker name:

8Base

Attacker class:

Cybercrime

Attack technique:

Ransomware

Ransom demand:

N/A

Exfiltrated data amount:

N/A

Exfiltrated data type:

Accounting documents, certificates, confidentiality agreements, employment contracts, invoices, personal data, files, and receipts.

Leaked data:

/

Ransom deadline:

27th May 24

Cyber Risk Factor:

4

Image:

 

Stay safe!

Hackmanac Team!

Latest news

				
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----