Service Hotline: 15203845779
Your Current Location: Homepage > Internet Data Security Knowledge >

Ransomware Hotspot Events

2022/1/17 Ransomware Terminator

Portland Bar Chain McMenamins Suffers Ransomware Attack


Portland, Oregon's hotel and bar chain McMenamins stated that the company was attacked with ransomware, which may have compromised employee personal information, but customer payment information seems unaffected. McMenamins claimed to have confirmed and blocked the ransomware attack on December 12, notified the FBI, and hired a cybersecurity firm to determine the origin and full scope of the attack. In a press release, the company said employee data such as names, addresses, birth dates, social security numbers, and direct deposit bank account information might have been obtained. The company stated: "To reassure employees, McMenamins will offer identity and credit protection services and provide a dedicated help hotline."



Reference Link:

https://www.kgw.com/article/news/local/mcmenamins-ransomware-attack/283-dc039d56-cf82-4f06-8862-c2f6223e3893





Clop Ransomware Group Posts Secret Police Data on Dark Web


After a successful phishing attack on IT service provider Dacoll in October 2021, the Clop ransomware group obtained a large amount of data, including from the Police National Computer (PNC), managed by Dacoll. When Dacoll refused to pay the ransom, attackers uploaded hundreds of files to the dark web. Among the uploaded PNC files were close-up photos of drivers from the UK National Automatic Number Plate Recognition System (ANPR). The leakage of law enforcement-held data is particularly concerning as these data are highly confidential and could disrupt criminal investigations. If this information falls into the wrong hands, it could pose serious risks to crime victims and witnesses.



Reference Link:

https://www.infosecurity-magazine.com/news/ransomware-gang-police-data-dark/


Related Reading

  • The Newly Spread .360 Suffix Ransomware in 2022

    .360 Suffix Ransomware is a new virus spread by the well-known ransomware family, BeijngCrypt. What is .360 Suffix Ransomware? Like most ransomware, .360 suffix ransomware prevents access to files by encrypting them, changing the file name, and providing the victim with instructions on how to recover their files. The ransomware encrypts files and appends ".360" to the filenames.

  • The Crazy Spread of .520 Ransomware and Its Data Recovery This Year

    The .520 suffix ransomware is a new type of spreading virus of the internationally known BeijingCrypt ransomware family. It has evolved from this year's .dragon ransomware and .file ransomware, and since its outbreak at the end of September this year, we have received numerous consultations and requests for help from enterprises with encrypted data infected daily. What is .520 ransomware? The .520 virus...

  • Ransomware Hotspot Events

    Belgium's Ministry of Defense admits attackers used the Log4j vulnerability to access its computer network Belgium's Ministry of Defense suffered a cyberattack because criminals exploited a vulnerability in Log4j. This attack marks the first time a NATO country's defense department has fallen victim to these vulnerabilities. A spokesperson for Belgium's Ministry of Defense said: "The Ministry of Defense discovered its computer network was attacked and quickly took measures to isolate the affected parts. The primary mission is to maintain the availability of the defense network."

Cyber Data Security Knowledge

  • Free service hotline:

    Monday to Sunday 8:00-22:00

    15203845779

  • WeChat Scan

    To start a conversation

Ransomware file decryption, key cracking, subsequent defense
Data decryption hotline: 15203845779