DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

It: Municipality of Porto Sant’Elpidio publicly quiet after ransomware attack and partial dump of files

Posted on May 29, 2021 by Dissent

This week, DataBreaches.net reported on a new dedicated leak site and threat actors who had hit Clover Park School District in Washington.

The same threat actors, whose name is not even clear (are they PayOrGrief or Grief_List or…) have listed three other victims on their site who presumably did not pay their ransom demands. One of them is the municipality of Porto Sant’Elpidio in Italy.  Marco A. De Felice reports about that incident on Suspect File, noting that “About 900 MB for a total of about 1000 files have been dumped.” According to the threat actors, the total amount of stolen material is about 8 GB.

De Felice describes the data dump as mostly administrative files, but also files containing sensitive information on residents. In skimming the data dump, DataBreaches.net did see one report on a vehicle accident that identified the car, the owner, the driver, and that there were injuries, etc. How many other files may also contain personal information is not known to DataBreaches.net at this time.

There is nothing currently posted on the municipality’s web site about any attack, and no press releases or any news coverage that DataBreaches.net can find other than Suspect File’s coverage.  De Felice tried to find out what the government has done in response to the attack:

Before the publication of this article SuspectFile tried to get in touch with the Mayor via e-mail, asking to answer some questions. We asked, among other things, whether or not the Administration had complied with the provisions contained in the European Union regulation on the processing of personal data and privacy ( GDPR ) and if it had therefore already informed the Guarantor and the bodies of Competent police.

In the e-mail we sent, a copy was made of the President of the City Council, the Councilor for the budget / transparent Administration and the Local Police Command of the Municipality. We have not received any responses at the moment.

As I understand it, the GDPR at Article 33 requires that, in the event of a personal data breach, data controllers should notify the appropriate supervisory authority without undue delay and, where feasible, not later than 72 hours after having become aware of it.  If the threat actors really waited 21 days before dumping data, then the municipality may have known about this breach for weeks. What, if anything, have they done in response?

There is much we do not yet know — about this threat actor/group — and the impact of the incident on the municipality. Check SuspectFile daily and follow @amvinfe on Twitter to stay abreast of news.

 


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
Category: Government SectorMalwareNon-U.S.

Post navigation

← UMD-Baltimore updates Accellion breach notification after finding PII and PHI involved
MA: Sturdy Hospital pays ransom after patient information is stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004
  • BlackSuit ransomware site seized as part of Operation Checkmate

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.