The ransomware claim indicates that safepay targeted barnet.com.au, an Australian communications management organisation, potentially threatening sensitive legal communications. The attack underscores the cybersecurity risks faced by legal institutions in Australia. #Australia
Category: Ransom Monitor
The threat actor safepay has claimed to have ransomware attack on mactavishco.ca, a small Canadian boutique retailer in Medicine Hat, Alberta, specializing in curated home dΓ©cor and gifts. The incident has impacted Canada.
Safepay has claimed responsibility for a ransomware attack on steuerberater-scheerer.de, a German tax consulting firm based in Schweinfurt, Bavaria. The incident has impacted Germany.
The ransomware claim alleges that the threat actor safepay targeted the small municipality of untereisesheim.de in southwestern Germany, causing disruption to local government operations. The attack underscores the persistent cyber threats faced by municipal entities in Germany. #Germany
The ransomware claim involves juliuskoch.com, a historic German company, targeted by the threat actor safepay. The incident has impacted Germany. #Germany
Akira ransomware group has claimed to have compromised Rosland Capital, a US-based precious metals asset management firm, threatening to release critical corporate data including projects, clients information, and confidential files. The impacted country is #UnitedStates.
The ransomware claim states that the threat actor akira has stolen and is prepared to upload 60GB of sensitive corporate data, including detailed client personal information, financial records, hearings, police records, and more, from Foster & Eldridge, LLP, a Boston-based law firm specializing in medical malpractice defense. The impacted country is #UnitedStates.
The ransomware claim involves a threat actor named akira who has threatened to upload approximately 10GB of Consolidated Sterilizer Systems’ corporate data, including personal employee information, financials, and contracts. The impacted country is the United States.
The threat actor dragonforce has targeted 3S Software, a leading provider of technology services including security system integration, with a ransomware claim aimed at disrupting their operations. The attack impacts operations in the United States.
The Fargo Park District in the US experienced a ransomware attack attributed to the threat actor interlock, impacting multiple divisions including Finance, Operations, and Community Physical Activity. The incident disrupted access to essential services across over 150 parks and extensive trail systems, affecting US.
Lockbit 5.0 has targeted a new blog domain with advanced multi-layered security measures to prevent infiltration by formidable threats such as FBI agents, operated by threat actor lockbit3. The attack affects users in #UnitedStates.
The ransomware claim involves Smith Fire Systems, a provider of fire protection services, being targeted by the threat actor Anubis. The incident has impacted operations in the United States. #UnitedStates
The National Health Insurance Management Authority in Kenya has fallen victim to a ransomware attack perpetrated by the threat actor nova, resulting in a theft of sensitive patient data. This breach threatens the confidentiality of healthcare information and disrupts access to critical medical services in Kenya. #Kenya
Kana Pipeline Inc in the US has fallen victim to ransomware attacks attributed to the threat actor qilin. The incident has severely impacted their operations within the United States. #UnitedStates
Threat actor akira has claimed to upload 24GB of ABC Home & Commercial Services’ corporate data, including employee personal information, financials, contracts, and confidential files, threatening the US. #UnitedStates