DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Wordfly customers begin to disclose ransomware attack on the vendor

Posted on August 6, 2022 by chum1ng0

Wordfly is a digital marketing platform that offers email, SMS marketing, forms and surveys for its clients to use with their customers or contacts.

On July 10, Wordfly experienced a ransomware attack that encrypted their environment and disrupted services until July 29, when their status account tweeted:

WordFly has returned to service. Thank you for your tremendous amount of patience and support. More info is coming to your inbox soon. https://t.co/s7YFm0f8U0

— WordFly Status (@wordflystatus) July 29, 2022

WordFly has returned to service. Thank you for your tremendous amount of patience and support. More info is coming to your inbox soon. https://t.co/s7YFm0f8U0

A fuller description of the incident by Wordfly can be found on their site. The statement does not indicate who the bad actor was. Of note, they report that the customer data included “email addresses, names, and other data our customers import or collect via Wordfly.”

In their disclosure, Wordfly also states:

It is our understanding that as of the evening of July 15, 2022, the data was deleted from the bad actor’s possession. We have no evidence to suggest, before the bad actor deleted the data, that the data was leaked or disseminated elsewhere. We also have no evidence to suggest that any of this information has been, or will be, misused.

So how did this deletion happen? Did Wordfly pay a ransom demand? DataBreaches sent an email inquiry to Wordfly days ago but no reply has been received.

Notifications Begin

Some of Wordfly’s clients have started notifying their customers. In its FAQ on the incident, Wordfly had written:

Should I contact my customers?

Due to the generally non-sensitive and public nature of the data that we know was exported so far, as well as our understanding of the nature of this ransomware event, we currently have no evidence to suggest that any of this information has been, or will be, misused to perpetrate harm to the rights and liberties of our customers or their subscribers. You may choose to contact your customers out of an abundance of transparency or if you know you uploaded or collected data in WordFly that is sensitive.

An FAQ for U.S./Canadian/Asian Pacific clients of Wordfly was provided separately, here.

As of yesterday, entities that had already disclosed this breach includes U.S. entities such as the Cleveland Museum of Art,  Louisville Zoo,  and the Smithsonian National Zoo.

Non-U.S. entities reporting the breach include:

Canadian entities reported by The Globe and Mail: the National Ballet of Canada, Toronto Symphony Orchestra, Canadian Opera Company, Canadian Stage Company, and The Musical Stage Company. Other Canadian entities include OceanWise, the Vancouver Symphony Orchestra, and Winspear.

The National Gallery of Australia and Sydney Dance Company in Australia  announced the breach, as did the Royal New Zealand Ballet.

In the U.K., the Box Plymouth and Courtauld Gallery both issued notifications.

The preceding are just a sampling of notices we have found around the web and there are likely many more.


Dissent also contributed to the research and reporting of this incident.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Authorities released free decryptor for Phobos and 8base ransomware
  • New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers
Category: MalwareMiscellaneousSubcontractor

Post navigation

← RaidForums admin “Omni” granted conditional bail while U.K. considers U.S. extradition request
New GwisinLocker ransomware encrypts Windows and Linux ESXi servers →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.