DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

AU: Activewear retailer hacked, data now on the dark web

Posted on June 11, 2020June 11, 2020 by Dissent

RagTrader reports:

Activewear retailer In Sport had its head office server and computers ransomwared in May, as cyber crime during COVID-19 escalates.

In a letter to customers, it revealed the attack was detected on May 16 but it was unknown what files hackers accessed.

Read more on RagTrader.

Update: This appears to be an attack by the Sodinokibi ransomware team (“REvil”).  As proof, they dumped some data, most of which dealt with the costs and sales of various namebrand merchandise.  Those files were subsequently removed by the hosting site where they had uploaded the data, although the data are now out there in various hands.  REvil also uploaded a screenshot of a directory of some folders.

Directory of folders REvil posted as partial proof of their attack on In Sport.

Related Posts:

  • Another COVID-19 Research Firm Targeted by Ransomware Attack
  • JD Sports hit by cyber-attack that accessed 10m…
  • Hackers hit Harris in latest ‘highly sophisticated’…
  • Sodinokibi/REvil ransomware gang pwns British…
  • UK: WHSmith targeted by hackers in cyber attack as…

Post navigation

← BST sued by Community Care customers over Maze ransomware attack
Thanos ransomware auto-spreads to Windows devices, evades security →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Seeking clarification on Maine’s data breach notification statute
  • East River Medical Imaging notifies 605,809 patients of breach
  • Russian hackers exploiting Outlook bug to hijack Exchange accounts
  • Britain dismisses report claiming Sellafield nuclear site hacking, says no malware exists on our system
  • 23andMe data breach: Hackers accessed data of 6.9 million users
  • AlphV claims they have started contacting some of Tipalti’s clients (1)
  • Research: Privacy as Pretense: Empirically Mapping the Gap Between Legislative & Judicial Protections of Privacy
  • What it means — CitrixBleed ransomware group woes grow as over 60 credit unions, hospitals, financial services and more breached in US.

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net