DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on November 11, 2022 by chum1ng0

ES: Half a million taxpayers and 50,000 police have their information stolen by attackers

El Economista reports the General Council of the Judiciary (CGPJ) suffered a cyberattack on its Punto Neutro Judicial (PNJ) platform that connects judicial bodies with other government agencies, including the National Police Force, the Attorney General’s Office, and the General Secretariat of Penitentiary Institutions.

DataBreaches sent an email inquiry on November 7 but received no reply. An email was also sent to Spain’s regulator, AEPD, asking if they had been notified. No reply was received from them, either, but on November 8, the CGPJ announced the cyberattack that they had detected in October.

Their statement indicates that the attackers used the PNJ platform to gain access to other public government institutions, but that no data relating to judicial proceedings or other information held by the courts and tribunals had been compromised. Relevant agencies were notified as was the AEPD.

On November 11, El Hacker reported that attackers were able to hit the Treasury Information Services, and exfiltrated information on half a million Spanish taxpayers. They were also able to access the General Police Directorate and obtained the personal information on 50,000 police officers.

CGPJ’s statement does not indicate who the attackers are or whether there was any ransom being negotiated. DataBreaches has not spotted this incident on any dedicated leak site by time of this publication.

ES: Seville Urban Transportation affected by cyberattack

On November 8, the Seville Urban Transport Company (TUSSAM) disclosed it had been the target of a cyber attack on November 6 and that both the mobile application and the information panels at bus stops were disabled as a result.

A notice on Tussam's website informs people of the cyberattack.
Notice on TUSSAM’s site informs people of the incident.

Viva Sevilla reports the company disconnected all systems and equipment to analyze them for malware and to prevent any malware from replicating when systems were switched back on.

According to the company, the attackers did not access or acquire private customer data or the company’s own operational data. “In this sense,” the paper reported, “the movement of buses on the street was not affected by resorting to using manual means, which guaranteed at all times the provision of public service.”

A tweet on November 10 informed the public that while screens at some bus stops were already restored as servers progressively recover, they could not say when the app would be operational again.

Buenas tardes. Se está intentando trabajar lo más rápido posible, pero no se sabe a ciencia cierta cuando puede estar de nuevo operativa la AppTussam. Las pantallas TIC de las paradas están operativas ya (no todas) porque los servidores se están recuperando de manera progresiva.

— CORTES Y DESVÍOS TUSSAM (NO OFICIAL) UseMascarilla (@cortes_tussam) November 10, 2022

TUSSAM did not reply to any email inquiry seeking additional details. There was no public mention of any ransom demand or any negotiations.

ES: Security incident affecting Orange telecom customers

A cyberattack on a debt collection provider used by Orange has breached some customers’ personal information. Orange’s press release informs customers (translation:)

…. This has resulted in sensitive information (name, surname, postal address, telephone number, e-mail address, ID card number, date of birth, nationality and IBAN code of the current account) of a limited number of its customers being exposed.

The provider’s name was not disclosed in the release, and Orange did not reply to an email inquiry sent to them.

As of publication time, DataBreaches has found no listing on any dark web leak site that might relate to this incident.

MX: SICT reports that there was no damage to internal systems and no data breach

As previously reported on DataBreaches, the Secretariat of Infrastructure, Communications and Transportation (SICT) was the victim of a cyberattack discovered on October 24, but it reportedly  did not damage the agency’s systems, nor was citizen’s data compromised.

 Processing of certain applications and documents has been suspended until December 31, but without penalty to those who cannot apply for new papers or renewals.

Following the cyber-attack at the end of October, Jorge Nuño, head of the SICT’s office, explained that only 110 computers were attacked, out of a total of 11,000, with ransomware. The type of ransomware was not revealed and SICT did not respond to an inquiry from DataBreaches.

GT:  Customs Service APM terminals affected by cyberattack by Hive

In September, DataBreaches reported a ransomware attack on  Guatemala’s Ministry of Foreign Affairs. On October 18, the Guatemalan Customs Service confirmed failures in the computer systems of APM Terminals and that a contingency program was being activated.

Prensa Libre reported technical problems in the systems of APM Terminals Quetzal in Escuintla, but the operations of loading and unloading of goods were being maintained.

“We have been informed that there are failures in the system, which the authorities of that terminal inform us that they are taking care of them to reestablish it and provide the service as it corresponds”.

No mention had been made of any ransomware or ransom demands, but on November 8, the Hive threat actors listed “TCQ”, Quetzal Container Terminal, on their dedicated leak site, Hive claims to have exfiltrated 5GB of an Oracle database with backup.

Neither APM’s portal nor their Facebook page make any direct mention of any cyber attack, but the portal describes the alternate procedures currently in effect.


Edited by Dissent


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • Romanian prisoner hacks prison IT system in plot made for a Netflix movie
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt
Category: Breach IncidentsBusiness SectorGovernment SectorHackMalwareNon-U.S.

Post navigation

← PA: Medical assistant charged with stealing and misusing patient identity information
Thales investigating — again — LockBit 3.0’s claims as share prices plummet after data leak →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.