
Victim: Development Bank of Jamaica
Country : JM
Actor: hunters
Source: https://hunters55rdxciehoqzwv7vgyv6nt37tbwax2reroyzxhou7my5ejyid.onion/companies/2937697954
Discovered: 2024-12-18 20:16:42.159123
Published: 2024-12-18 12:06:16.000000
Country : JM
Actor: hunters
Source: https://hunters55rdxciehoqzwv7vgyv6nt37tbwax2reroyzxhou7my5ejyid.onion/companies/2937697954
Discovered: 2024-12-18 20:16:42.159123
Published: 2024-12-18 12:06:16.000000
Description : Country : Jamaica – Exfiltraded data : yes – Encrypted data : yes

Ransomware Victims – ALL
Other Victims by hunters
Ransomware Landscape in Jamaica
- Victim: Development Bank of Jamaica
- Actor: Hunters Ransomware Group
- Exfiltrated Data: Yes
- Encrypted Data: Yes
Key Points
- Ransomware Activity: Jamaica has seen an increase in ransomware attacks, targeting both public and private sectors.
- Common Targets: Financial institutions, healthcare providers, and government agencies are frequently targeted due to sensitive data.
- Ransomware Groups: Groups like Hunters are known for their sophisticated tactics, including data exfiltration and double extortion methods.
- Impact: Ransomware attacks can lead to significant financial losses, operational disruptions, and reputational damage.
- Cybersecurity Awareness: There is a growing awareness of cybersecurity threats among Jamaican organizations, prompting increased investment in security measures.
National Cyber Agency Information
- Jamaica Cyber Security Incident Response Team (CSIRT): Established to provide guidance and support in responding to cyber incidents.
- National Cybersecurity Strategy: The Jamaican government has implemented a national strategy to enhance cybersecurity resilience across sectors.
- Public Awareness Campaigns: Initiatives aimed at educating citizens and organizations about cybersecurity best practices.
- Collaboration: The CSIRT collaborates with international partners to share threat intelligence and improve response capabilities.
- Regulatory Framework: Ongoing efforts to develop and enforce cybersecurity regulations to protect critical infrastructure.