DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Mx: El Instituto Nacional de Medicina Genómica (Inmegen) hit by cyberattack

Posted on September 27, 2021 by Dissent

The same group of threat actors who recently hit the South African National Space Agency (SANSA), are now claiming to have hit a Mexican government health agency that is involved in COVID testing or research: El Instituto Nacional de Medicina Genómica (Inmegen).

Cooming
Image: DataBreaches.net

Limited data has been publicly dumped so far, but it appears to include a database called “COVID” that has a number of tables relating to collection of information on COVID-19 patients. One table, as an example, includes 400 records with fields like name, age, date of birth, email, phone, and other details.

Other files in the dump contain testing results on named patients, such as one folder that contains more than two dozen .pdf files.

COVID test results
Image: Testing results for COVID-19 on a named patient. Redacted by DataBreaches.net.

CoomingProject’s site says they are not a ransomware group. They do not say what demands they are making on this victim or how much data they have from them, but in reply to an inquiry from DataBreaches.net, they claimed that they had exfiltrated 50 GB of data from Inmegen and “their partner.”

Perhaps one of the oddest things about their data dump is that it included a file call “README.” Thinking it might be a copy of the ransom note, DataBreaches.net opened it, only to find what appeared to be an ad or listing for KelvinSecTeam.

KelvinSecTeam
Image: DataBreaches.net

The @KelvinSecTeam channel on Telegram has more than 600 members, but there is no mention in their channel of CoomingProject or Inmegen, so this remains a bit of a head-scratcher and may just be an error.

Inmegen has not responded to multiple inquires asking about the attack, and there is no notice on their web site that we have seen. This post will be updated if more information becomes available.


Additional research by Chum1ng0


Related:

  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
  • UK: 'Catastrophic' attack as Russians hack files on EIGHT MoD bases and post them on the dark web
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
Category: Breach IncidentsHackHealth Data

Post navigation

← MD: Groove threat actors claim to have hit Robinwood Orthopaedic
U.S. Extradites Convicted Russian Hacker Aleksei Burkov To Russia →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.