![]() “At this point, we are seeing industry estimates of several hundred of victims across the country,” the senior CISA official said. But cybersecurity researchers say scores if not hundreds of companies could by then have had sensitive data quietly exfiltrated. maker, Progress Software, alerted customers to the breach on May 31 and issued a patch. officials “have no evidence to suggest coordination between Cl0p and the Russian government,” the official said. The senior CISA official told reporters a “small number” of federal agencies were hit - declining to name them - and said “this is not a widespread campaign affecting a large number of federal agencies.” The official, speaking on condition of anonymity to discuss the breach, said no federal agencies had received extortion demands and no data from an affected federal agency had been leaked online by Cl0p. The gang, among the world’s most prolific cybercrime syndicates, also claimed it would delete any data stolen from governments, cities and police departments. The Cl0p ransomware syndicate behind the hack announced last week on its dark web site that its victims, who it suggested numbered in the hundreds, had until Wednesday to get in touch to negotiate a ransom or risk having sensitive stolen data dumped online. The Oregon Department of Transportation confirmed Thursday that the attackers accessed personal information, some sensitive, for about 3.5 million people to whom the state issued identity cards or driver’s licenses. They encouraged Louisiana residents to freeze their credit to guard against identity theft. That included their name, address, Social Security number and birthdate. ![]() Louisiana officials said Thursday that people with a driver’s license or vehicle registration in the state likely had their personal information exposed. Security experts say that can include sensitive financial and insurance data. The exploited program, MOVEit, is widely used by businesses to securely share files. ![]() Known victims to date include Louisiana’s Office of Motor Vehicles, Oregon’s Department of Transportation, the Nova Scotia provincial government, British Airways, the British Broadcasting Company and the U.K. Energy Department spokesperson Chad Smith said two agency entities were compromised but did not provide more detail. ![]() military nor intelligence community was affected. “Although we are very concerned about this campaign and working on it with urgency, this is not a campaign like SolarWinds that presents a systemic risk to our national security or our nation’s networks,” she added.Ī senior CISA official said neither the U.S. “Based on discussions we have had with industry partners … these intrusions are not being leveraged to gain broader access, to gain persistence into targeted systems, or to steal specific high value information- in sum, as we understand it, this attack is largely an opportunistic one,” Easterly said. Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, told reporters that unlike the meticulous, stealthy SolarWinds hacking campaign attributed to state-backed Russian intelligence agents that was months in the making, this campaign was short, relatively superficial and caught quickly. But for others among what could be hundreds of victims from industry to higher education - including patrons of at least two state motor vehicle agencies - the hack was beginning to show some serious impacts.
0 Comments
Leave a Reply. |