DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Bits ‘n Pieces (Trozos y Piezas)

Posted on May 23, 2023 by chum1ng0

CO: SECOP II platform affected by “presumed hacking”

The SECOP II platform is a transactional platform with accounts for state entities and contractors used for submitting, evaluating, and awarding contracts.  On May 3, La Agencia Nacional de Contratación Pública – Colombia Compra Eficiente reported a cyberattack on its SECOP II platform. The attack was announced on its Twitter account:

#Comunicado | Informamos a los usuarios del SECOP II que la plataforma ya se encuentra disponible, la interrupción de la infraestructura de la plataforma se presentó por presunto hackeo y se tomarán las medidas pertinentes.https://t.co/RbkLKZ2gyw pic.twitter.com/CIVXRusuoW

— Colombia Compra Eficiente (@colombiacompra) May 3, 2023

Machine Translation:

We inform SECOP II users that the platform is now available; the interruption of the platform’s infrastructure was caused by a presumed hacking and the pertinent measures will be taken.

In a May 5 update on Twitter, they tweeted:

We have worked constantly for the normalization of SECOP II operation. However, despite the activities carried out, there have been delays in some actions.

After the inconveniences presented in SECOP II, we have worked in coordination with the entities in charge of digital security and we are pleased to announce that the platform is now operating normally.

In an interview reported on Infobae, the deputy director of information and technology of Colombia Compra Eficiente said (machine translation):

The issue of information risks and cyber attacks are in the light of day and that is an issue that the National Government is contemplating in the National Development Plan, because in terms of cyber security there is no limit, any mitigation must be implemented by companies. Unfortunately risks cannot be eliminated: what we can do is to create opportunities for improvement to provide a better service and minimize the impacts that may affect Colombians.”

DataBreaches.net emailed SECOP on May 8 to request an update and to ask if users’ information had been compromised. On May 11, we received an acknowledgment of receipt of our email but have not received any substantive reply. The same day, however, they announced:

We inform that this Thursday, May 11, SECOP II presented intermittency.

At this moment the platform is now available and functioning normally.

Users complained, however, that the platform was not functioning normally that day.

On May 18, DataBreaches received a response to our email from William Renan Rodriguez, Secretary General. He wrote that the incident was under investigation, but he noted that information on the SECOP II platform is obfuscated with a specific hash.

There have been no further updates since then.

AR: INTA hit by ransomware attack

Instituto Nacional de Tecnologia Agropecuaria (INTA) is an Argentinean decentralized public agency under the Ministry of Agriculture and Fisheries of the Nation. It describes itself as contributing to the sustainable development of the agricultural, agri-food and agro-industrial sector through research and extension.

On May 2, INTA tweeted that it had suffered a computer attack:

Informamos que durante el fin de semana hemos detectado un ataque a nuestros servicios informáticos institucionales.

Desde ese momento, hemos activado los protocolos de seguridad.

— INTA (@intaargentina) May 2, 2023

In a series of tweets, it reported (machine translation):

We inform you that over the weekend we have detected an attack on our institutional IT services.

Since then, we have activated security protocols.

We are working together with specialists from information security companies and in close communication with the National Cybersecurity Directorate (@cert_Argentina) in accordance with the provisions of the current regulatory framework to solve the problem.

This attack is affecting our network of more than 400 points nationwide, which is why we have decided to suspend all institutional computer services until it is safe to move forward with their restoration.

We are focused on continuing with the recovery tasks to normalize the situation. We hope to be able to re-establish our services in a controlled manner as soon as possible.

Clarin reported that a letter the agency sent its employees called it a ransomware attack.  “Now, to release the systems, the hackers would be demanding no more and no less than a sum of 2.5 million dollars,” the agency wrote.

This was not the first time that INTA had a ransomware attack. On March 15, 2022, Twitter user Mauro Eldritch reported an attack by the Everest group.

INTA has not disclosed what ransomware group or bad actor is responsible for the current attack and DataBreaches has not seen it listed on any leak site. INTA did not reply to a message from DataBreaches.net sent via Facebook on May 6 and their website contact page has not been operational.

BR: Logística Integrada Sulamericana Leaked by BlackCat

Brazilian logistics firm Logística Integrada Sulamericana (LISA) was added to BlackCat’s leak site on April 21. BlackCat provided 45 screenshots of various logistics company documents, including identity cards, as proof of their access to LISA.

BlackCat publicly threatened the firm:

“The company LISA LOGICTICA and its management were fully aware of the attack and the theft of sensitive data from their system. They had every opportunity to contact us to protect the personal and critical data of their customers and partners, but failed to do so, believing that their customers’ and partners’ data was nothing and could be sold to be used for criminal purposes.”

Image: DataBreaches.net

DataBreaches found no notice of any incident on the Logistic’s website or their social networks. Nor did they respond to DataBreaches’s email inquiries of April 21 and April 24.

CL: Updating: Medusa Leaks SONDA

DataBreaches recently reported a ransomware attack on Chile’s SONDA. On May 6, Medusa’s Telegram channel leaked SONDA’s data in 327 parts, each part being 3.8 GB.

Post on Medusa reads:SONDA *Duplicate with update) Sonda, This is a Chilean multinational IT company headquartered in Santiago we hacked last month. But it's network is still vulnerable and we hacked into company again in 2023-05-04. There is proof image below. More than 4TB of data is published on telegram channel today. Everyone can access & download it's data. We recommend companies not to use Sonda IT support.

Inspection of some parts revealed the personal data of employees and suppliers. Databreaches.net confirmed that these data were valid by checking the names of current employees against other files with IDs, resumes, data sheets, and contracts.

DataBreaches does not know if SONDA has notified its employees that their data has been dumped on a free Telegram channel.

CL: Cooperativa de Ahorro y Crédito Ahorrocoop Ltda hit by Medusa

Cooperativa de Ahorro y Crédito Ahorrocoop Ltda (AhorroCoop) is a Chilean savings and credit cooperative with 7 branches in the country. The cooperative has more than 65,000 members nationwide. It was added to the Medusa Blog leak site on May 10. What appear to be internal documents from the cooperative were provided as proof.

Image and redaction by DataBreaches.net.

Because there was no notice on their website, Databreaches.net emailed an executive of the company on May 10th and then again on May 15th, requesting more details. Neither email received a reply, so it is not clear whether the members of this cooperative have been notified that their personal data has been exposed.


Reporting by Chum1ng0, editing by Dissent


Related:

  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Government will 'robustly defend' compensation claims from Afghans put at risk by data breach
  • Missouri Adopts New Data Breach Notice Law
Category: Breach IncidentsExposure

Post navigation

← Insurance Information Bureau Of India Hit by Ransomware Attack: Hackers Demand $250,000 As Ransom
Update: NCB Management Services breach affected more than 1 million, but how many more? (1) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.