DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

Ca: Boutin transport company victim of a cyber attack

Posted on May 4, 2021May 4, 2021 by chum1ng0

Groupe Boutin Inc. is a firm in Quebec providing logistics, transportation, and warehousing services, as well as private fleets.

Sam Harper reports that the firm called in a security specialist after detecting a problem and receiving a ransom demand. According to the company’s statement (translation):

The customer and employee portals, accessible from their website, are not responding. In order not to take any unnecessary risks, “we shut down access to all of our systems and workstations. Staff must rebuild a number of servers and “start over some applications. Some of the work in operations is done manually. ”

Boutin says their operations are continuing. “We have been able with our team to make sure that service is not too disrupted. ”

Read more on Blog.Hackfest

The attack has been claimed by CL0P threat actors, who have listed the company on their leak site and have dumped a number of files allegedly from Boutin’s server(s).  Unlike some other groups, CLOP does not routinely make a statement about how much data they have exfiltrated from a victim, so the dumped files may or may not be the total dump. The sample did include some personally identifiable information on employees such as photo IDs with health insurance information and an image of a passport. Luckily for the victims, CLOP’s downloads are so frustratingly slow that most people will never download them.


Reporting by @Chum1ng0. Additional comment by Dissent.

 

 

 

Related Posts:

  • Hack attack at major B.C. booze distributor leaves…
  • CH: Griesser AG victim of ransomware attack
  • Ca: Canac hardware stores victims of a cyberattack
  • Ca: The former Coop fédérée is the target of cyber hackers
  • FR: The Bourbon Group hit by a cyber attack

Post navigation

← 4,700 Amazon employees had unauthorized access to private seller data
Circuit Split No More: 2nd Circuit Clarifies Article III Standing in Data Breach Cases →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Update: Cardiovascular Consultants Ltd. ransomware attack reportedly affected 500,000 patients, guarantors, and staff
  • Data breach by Addenbrooke’s Hospital reveals patient information
  • Millions of patient scans and health records spilling online thanks to decades-old protocol bug
  • Cybersecurity: Federal Agencies Made Progress, but Need to Fully Implement Incident Response Requirements (GAO Report)
  • Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
  • CBIZ KA Notice of Data Privacy Incident (Prime Healthcare)
  • Seeking clarification on Maine’s data breach notification statute
  • East River Medical Imaging notifies 605,809 patients of breach

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net