ID
int64
2
2.11k
name
stringlengths
4
279
description
stringlengths
19
3.75k
start_date
stringlengths
10
10
end_date
stringlengths
10
10
inclusion_criteria
stringclasses
22 values
inclusion_criteria_subcode
stringclasses
2 values
source_incident_detection_disclosure
stringclasses
26 values
incident_type
stringclasses
23 values
receiver_name
stringclasses
172 values
receiver_country
stringlengths
8
438
receiver_region
stringlengths
8
1.24k
receiver_category
stringlengths
11
3.52k
receiver_category_subcode
stringlengths
11
1.32k
initiator_name
stringlengths
7
480
initiator_country
stringclasses
131 values
initiator_category
stringclasses
25 values
initiator_category_subcode
stringclasses
23 values
number_of_attributions
int64
0
10
attribution_date
stringclasses
232 values
attribution_type
stringclasses
127 values
attribution_basis
stringclasses
101 values
attributing_actor
stringclasses
135 values
attribution_it_company
stringclasses
7 values
attributing_country
stringclasses
79 values
attributed_initiator
stringlengths
3
7.87k
attributed_initiator_country
stringclasses
195 values
attributed_initiator_category
stringclasses
75 values
attributed_initiator_subcategory
stringclasses
50 values
sources_attribution
stringlengths
2
1.25k
cyber_conflict_issue
stringclasses
56 values
offline_conflict_issue
stringclasses
62 values
offline_conflict_name_HIIK
stringclasses
21 values
offline_conflict_intensity
stringclasses
3 values
offline_conflict_intensity_subcode
stringclasses
5 values
number_of_political_responses
int64
0
7
political_response_date
stringclasses
41 values
political_response_type
stringclasses
20 values
political_response_type_subcode
stringclasses
23 values
political_response_country
stringclasses
31 values
political_response_actor
stringclasses
41 values
zero_days
stringclasses
4 values
zero_days_subcode
stringclasses
2 values
MITRE_initial_access
stringclasses
20 values
MITRE_impact
stringclasses
28 values
user_interaction
stringclasses
2 values
has_disruption
bool
2 classes
data_theft
stringclasses
4 values
disruption
stringclasses
4 values
hijacking
stringclasses
4 values
physical_effects_spatial
stringclasses
4 values
physical_effects_temporal
stringclasses
4 values
unweighted_cyber_intensity
int64
0
7
target_multiplier
stringclasses
3 values
weighted_cyber_intensity
float64
0
10
impact_indicator
stringclasses
4 values
impact_indicator_value
float64
0
13
functional_impact
stringclasses
6 values
intelligence_impact
stringclasses
6 values
political_impact_affected_entities
stringclasses
5 values
political_impact_affected_entities_exact_value
float64
0
150
political_impact_third_countries
stringclasses
4 values
political_impact_third_countries_exact_value
float64
0
6
economic_impact
stringclasses
2 values
economic_impact_exact_value
float64
0
100M
economic_impact_currency
stringclasses
2 values
state_responsibility_indicator
stringclasses
4 values
IL_breach_indicator
stringclasses
32 values
IL_breach_indicator_subcode
stringclasses
21 values
evidence_for_sanctions_indicator
stringclasses
3 values
number_of_legal_responses
int64
0
3
legal_response_date
stringclasses
18 values
legal_response_type
stringclasses
8 values
legal_response_type_subcode
stringclasses
4 values
legal_response_country
stringclasses
15 values
legal_response_actor
stringclasses
20 values
legal_attribution_reference
stringclasses
11 values
legal_attribution_reference_subcode
stringclasses
5 values
legal_response_indicator
stringclasses
4 values
casualties
float64
sources_url
stringlengths
2
9.44k
1,916
US care manager organization Minuteman Senior Services was breached by unknown actors in 2022
The non-profit organization Minuteman Senior Services (MSS), based in Massachusetts, notified the US Department of Health and Human Services that it was hit by a data breach, affecting more than 500 patients. The organization detected the intrusion on 20 November 2022 and alerted authorities on 27 January 2023. Based on an initial assessment, compromised data included patients' full name, address, date of birth, gender, health insurance information, diagnoses, and service utilization.
2022-11-21
2022-11-30
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft; Hijacking with Misuse
[['Minuteman Senior Services (MSS)']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
6
No system interference/disruption
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Human rights; Sovereignty
Civic / political rights;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.databreaches.net/second-verse-same-as-the-first-minuteman-senior-services-reports-another-breach-of-an-employee-email-account/', 'https://www.minutemansenior.org/about-us/notice-of-november-data-event']
1,925
Anonymous Sudan disrupted the website of Scandinavian Airlines (SAS) and leaked customer information on 14 February 2023
Scandinavian Airlines (SAS) was hacked and its website taken offline by a group referring to itself as Anonymous Sudan. Customers attempting to log in into the airline's app were redirected and shown information from accounts of other passengers. The incident follows a Quran buring by a far-right politician near the Turkish embassy in Stockholm during a protest in January that was funded by a former contributor to the Russian state-funded outlet RT. Anonymous Sudan has since claimed to have conducted a series of denial-of-service attacks against a variety of organizations in Sweden, citing retaliation for the book burning as its motivation. Targets have included the websites of Swedish airports, banks, railways, airlines, media, telecommunication providers, and organizations in the country's health and education sectors. These alleged attempts do not appear to have caused any significant downtime. Anonymous Sudan also took responsibility for knocking Sweden's national broadcaster SVT offline on 14 February, around the same time as the attack against SAS. Marcus Murray, founder of the Swedish cybersecurity firm Trusec, cautioned Anonymous Sudan may be a front for Russian operators, noting that the Quran burning may be an opportunity for Moscow to instigate tension between Sweden and Turkey to hobble Sweden's bid to join NATO. At least one pro-Russian hacker group, UserSec, had promised Anonymous Sudan support on Telegram. The IT security company Trustwave published a report on 30 March 2023 and concluded that Anonymous Sudan is very possibly a subgroup of the Russian hacktivist group Killnet.
2023-02-14
2023-02-14
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on critical infrastructure target(s)
null
Incident disclosed by attacker
Disruption; Hijacking with Misuse
[['Scandinavian Airlines']]
['Sweden']
[['EUROPE', 'EU', 'NORTHEU']]
[['Critical infrastructure']]
[['Transportation']]
['Anonymous Sudan']
['Sudan']
['Non-state-group']
['Hacktivist(s)']
2
2023-02-14; 2023-03-30
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Technical report (e.g., by IT-companies, Citizen Lab, EFF)
Attacker confirms; IT-security community attributes attacker
Anonymous Sudan; Trustwave
null
Sudan; United States
Anonymous Sudan; Anonymous Sudan < Killnet
Sudan; Not available
Non-state-group; Non-state-group
Hacktivist(s); Hacktivist(s)
['https://t.me/AnonymousSudan/113', 'https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/anonymous-sudan-religious-hacktivists-or-russian-front-group/']
System / ideology
System/ideology
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Network Denial of Service
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Low
6
Day (< 24h)
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
1-10
1
null
0
Not available
0
euro
None/Negligent
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://therecord.media/scandinavian-airlines-cyberattack-anonymous-sudan/', 'https://www.darkreading.com/attacks-breaches/pro-islam-anonymous-sudan-hacktivists-front-russia-killnet-operation', 'https://t.me/AnonymousSudan/113', 'https://www.databreaches.net/airline-sas-network-hit-by-hackers-says-app-was-compromised/', 'https://www.sasgroup.net/newsroom/press-releases/2023/sas-cyber-attack--update/', 'https://t.me/user_sec/151', 'https://www.svt.se/nyheter/inrikes/en-rad-it-attacker-mot-sverige-har-ar-kontot-som-tar-pa-sig-ansvaret', 'https://www.bleepingcomputer.com/news/security/scandinavian-airlines-says-cyberattack-caused-passenger-data-leak/', 'https://www.hackread.com/sas-airlines-hit-by-cyber-attack/', 'https://twitter.com/Dinosn/status/1626457027978338305', 'https://research.checkpoint.com/2023/20th-february-threat-intelligence-report/', 'https://twitter.com/lukOlejnik/status/1627551573348843520', 'https://twitter.com/cybersecboardrm/status/1625792913937428482', 'https://twitter.com/InfoSecSherpa/status/1625708981141311488', 'https://twitter.com/CERTEU/status/1631572192667353089', 'https://socradar.io/hacktivism-on-the-rise-killnet-anonymous-sudans-cyber-campaign-targets-australia/', 'https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/anonymous-sudan-religious-hacktivists-or-russian-front-group/', 'https://research.checkpoint.com/2023/3rd-april-threat-intelligence-report/', 'https://www.techrepublic.com/article/ddos-attack-israel/']
1,928
Moroccan Press Agency hit by DDoS attack
The websites of the Moroccan Press Agency (MAP) were hit by a DDoS attack from unknown actors on 16 February 2023.
2023-02-16
2023-02-16
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by victim
Disruption
[['Agence Marocaine de Presse (MAP)']]
['Morocco']
[['AFRICA', 'NAF', 'MENA']]
[['Media']]
null
['Not available']
['Not available']
['Not available']
null
1
2023-02-16 00:00:00
Media report (e.g., Reuters makes an attribution statement, without naming further sources)
Media-based attribution
Agence Marocaine de Presse (MAP)
null
Morocco
null
null
null
null
[]
System / ideology
Unknown
null
Unknown
null
0
null
null
null
null
null
No
null
Not available
Network Denial of Service
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Not available
none
none
1
Moderate - high political importance
1
Minor
5
Day (< 24h)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
[]
1,929
Unknown actor(s) infiltrated the FBI New York Field Office in February 2023
Unknown actor(s) hacked into the FBI's field office in New York in February 2023, attacking a system used to investigate child exploitation.
null
2023-02-01
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by authorities of victim state
Hijacking without Misuse
[['Federal Bureau of Investigation (FBI; United States)']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Police']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Not available
Not available
false
Not available
Not available
Hijacking, not used - empowerment (incident scores 1 point in intensity)
none
none
1
Moderate - high political importance
1
Minor
1
Not available
Not available
1-10
1
Not available
0
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://tarnkappe.info/artikel/it-sicherheit/fbi-gehackt-angriff-auf-aussenstelle-in-new-york-265594.html', 'https://www.wired.com/story/godaddy-hacked-3-years/', 'https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/', 'https://therecord.media/us-marshals-service-becomes-latest-law-enforcement-agency-hit-by-hackers/', 'https://www.hackread.com/us-marshals-service-ransomware-attack/', 'https://edition.cnn.com/2023/02/17/politics/fbi-cyber-incident-computer-network/index.html', 'https://www.hackread.com/fbi-hack-network-breach/', 'https://www.bleepingcomputer.com/news/security/fbi-is-investigating-a-cybersecurity-incident-on-its-network/', 'https://twitter.com/snlyngaas/status/1626556725942796288', 'https://cyberscoop.com/fbi-new-york-cyberattack/', 'https://www.databreaches.net/fbi-says-it-has-contained-cyber-incident-on-bureaus-computer-network/', 'https://twitter.com/Cyber_O51NT/status/1626834335704969216', 'https://twitter.com/Dennis_Kipker/status/1626973390224384002', 'https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/']
1,972
In February 2022, Azerbaijani political activist Abulfaz Gurbanli becomes the victim of a phishing attack
On 15 February 2022, Azerbaijan Internet Watch reported that the political activist Abulfaz Gurbanli lost access to his Gmail and Facebook account through a phishing email after deleting and resetting his device, and could not access it again until 17 February. A few months earlier, a report was released on the dissemination of the Pegasus spy software and listed numbers of activists, including Gurbanli, whose devices had been infected. This caused Gurbanli to reset his device. On 15 February, he was asked for an interview by an alleged journalist from the BBC Azerbaijan Service, who sent him an email with an infected attachment that, when opened, downloaded malware. Through the backdoor which was installed in the context, the hacker was able to access Gurbanli's accounts and delete the content of at least seven community sites where the activist was an administrator. The attack came shortly after the publication of an article by a pro-government media outlet that accused Gurbanli of organising colour revolutions in Azerbaijan. Based on that, this incident is assigned to the domestic conflict between Azerbaijan and the opposition, even though no attribution has been published.
2022-02-15
2022-02-17
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state
Disruption; Hijacking with Misuse
[['Abulfaz Gurbanli']]
['Azerbaijan']
[['ASIA', 'CENTAS']]
[['Social groups']]
[['Advocacy / activists (e.g. human rights organizations)']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
System / ideology; National power
System/ideology; National power
Azerbaijan (opposition); Azerbaijan (opposition)
Yes / HIIK intensity
HIIK 3
0
null
null
null
null
null
No
null
Phishing
Account Access Removal
Required
true
Not available
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
8
Days (< 7 days)
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Human rights
Civic / political rights
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.az-netwatch.org/news/deliberate-targeting-in-pro-government-media-leads-to-targeted-attacks-online-the-case-of-abulfaz-gurbanli/', 'https://www.qurium.org/alerts/azerbaijan/yet-another-targeted-malware-against-azerbajani-political-activists/']
1,975
Unknown actors exfiltrated data and deployed ransomware against US Marshals Service (USMS) computer systems on 17 February 2023
Unknown actors exfiltrated data and deployed ransomware against US Marshals Service (USMS) computer systems on 17 February 2023. USMS spokesperson Drew Wade announced that the affected system contained sensitive law enforcement information, such as returns from legal process, administrative information, and personally identifiable information (PII) pertaining to subjects of USMS investigations, third parties and certain USMS employees. A senior law enforcement official confirmed to NBC News, which first reported the incident, that the Witness Security Programme database was not affected.
2023-02-17
2023-02-17
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by media (without further information on source); Incident disclosed by authorities of victim state
Data theft; Disruption; Hijacking with Misuse; Ransomware
[['U.S. Marshals Service (USMS)']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Police']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration; Data Encrypted for Impact
Not available
true
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
6
Moderate - high political importance
6
Low
9
Day (< 24h)
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Human rights; Sovereignty
Civic / political rights;
Not available
1
2023-02-17 00:00:00
Other legal measures on national level (e.g. law enforcement investigations, arrests)
null
United States
US Justice Department
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.darkreading.com/threat-intelligence/us-marshals-ransomware-hit-major-incident', 'https://www.nbcnews.com/politics/politics-news/major-us-marshals-service-hack-compromises-sensitive-info-rcna72581', 'https://twitter.com/CyberScoopNews/status/1630610533715001364', 'https://twitter.com/securityaffairs/status/1630591974490210304', 'https://securityaffairs.com/142823/cyber-crime/u-s-marshals-service-suffers-a-ransomware-attack.html', 'https://twitter.com/lorenzofb/status/1630585945476018178', 'https://twitter.com/Dinosn/status/1630470251400818688', 'https://twitter.com/securityaffairs/status/1630701555967045640', 'https://twitter.com/RecordedFuture/status/1630681565247176708', 'https://therecord.media/us-marshals-service-becomes-latest-law-enforcement-agency-hit-by-hackers/', 'https://twitter.com/ImposeCost/status/1630397385456197634', 'https://twitter.com/snlyngaas/status/1630395432143581185', 'https://twitter.com/aselawaid/status/1630369754262192130', 'https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/', 'https://twitter.com/ericgeller/status/1630363090201059329', 'https://www.hackread.com/us-marshals-service-ransomware-attack/', 'https://twitter.com/DigitalPeaceNow/status/1630705797964390401', 'https://twitter.com/DigitalPeaceNow/status/1630705797964390401', 'https://twitter.com/Malwarebytes/status/1630740638391050240', 'https://twitter.com/DarkReading/status/1630948918799265792', 'https://twitter.com/campuscodi/status/1630848522584047617', 'https://twitter.com/securityaffairs/status/1631246209611358211', 'https://twitter.com/SentinelOne/status/1631263226913603584', 'https://www.wired.com/story/lastpass-engineer-breach-security-roundup/', 'https://www.cybereason.com/blog/variant-payload-prevention-fuzzy-similarity', 'https://www.malwarebytes.com/blog/news/2023/03/a-week-in-security-feb-27-mar-5', 'https://www.malwarebytes.com/blog/threat-intelligence/2023/03/ransomware-review-march-2023', 'https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/', 'https://research.checkpoint.com/2023/20th-march-threat-intelligence-report/', 'https://therecord.media/camden-county-police-ransomware-new-jersey-philadelphia', 'https://www.nbcnewyork.com/news/local/ransomware-attack-at-nj-county-police-department-locks-up-criminal-investigative-files/4219341/']
2,020
Ransom House Group conducted a ransomware attack against the Hospital Clínic in Barcelona on 5 March 2023
According to the Catalan Cybersecurity Agency, the ransomware group called Ransom House perpetrated a ransomware attack against the Hospital Clínic in Barcelona, Spain on 5 March 2023. General secretary of the hospital chapter of the Spanish labour union CC OO, Àlex Duque, stated that many processes had to be switched over to manual or paper-based procedures. The attack affected operations at the hospital's laboratory and pharmacy. The hospital temporarily redirected ambulances and canceled thousand non-emergency surgeries and radiotherapy appointments. Also mentioned in the government's statement is that the cyber attack affected the emergency services of three medical centres linked to the Clínic de Barcelona, namely CAP Casanova, CAP Borrell and CAP Les Corts. Just under three weeks after the attack, the clinic acknowledged that the confidentiality of patient and employee data could be at risk.
2023-03-02
2023-03-05
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Disruption; Hijacking with Misuse; Ransomware
[['Hospital Clinic de Barcelona']]
['Spain']
[['EUROPE', 'NATO', 'EU']]
[['Critical infrastructure']]
[['Health']]
['Ransom House']
['Not available']
['Not available']
null
1
2022-03-06 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attribution by receiver government / state entity
Cybersecurity Agency of Catalonia
null
Spain
Ransom House
null
null
null
['https://apnews.com/article/barcelona-hospital-cyberattack-ransomware-37e0fee33798c56459e63866ca8b449f']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Encrypted for Impact
Not available
true
Not available
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Very high political importance (e.g., critical infrastructure, military) - intensity multiplied by 1.5
6
Low
6
Days (< 7 days)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
null
0
Not available
0
euro
Not available
Human rights; Sovereignty
Civic / political rights;
Not available
1
2023-03-01 00:00:00
Other legal measures on national level (e.g. law enforcement investigations, arrests)
null
Spain
Mossos d'Esquadra (ESP)
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-05/el-hospital-clinic-de-barcelona-victima-de-un-ciberataque-que-afecta-a-las-urgencias-el-laboratorio-y-la-farmacia.html', 'https://govern.cat/salapremsa/notes-premsa/488242/comunicat', 'https://twitter.com/securityaffairs/status/1632878280985440257', 'https://securityaffairs.com/143121/cyber-crime/hospital-clinic-de-barcelona-ransomware.html', 'https://twitter.com/cybersecboardrm/status/1632839634026635264', 'https://twitter.com/ransomwaremap/status/1632822747343486977', 'https://twitter.com/DigitalPeaceNow/status/1632761704479088641', 'https://therecord.media/barcelona-hospital-ransomware-spain', 'https://apnews.com/article/barcelona-hospital-cyberattack-ransomware-37e0fee33798c56459e63866ca8b449f', 'https://www.databreaches.net/es-cyberattack-at-lhospital-clinic-has-affected-laboratory-pharmacy-and-emergency-services/', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-05/el-hospital-clinic-de-barcelona-victima-de-un-ciberataque-que-afecta-a-las-urgencias-el-laboratorio-y-la-farmacia.html', 'https://twitter.com/Dinosn/status/1632969620226277379', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-07/el-hospital-clinic-de-barcelona-48-horas-despues-del-ciberataque-hacemos-las-pruebas-y-lo-escribimos-en-papel.html', 'https://twitter.com/securityaffairs/status/1633210345396346888', 'https://www.bleepingcomputer.com/news/security/hospital-cl-nic-de-barcelona-severely-impacted-by-ransomware-attack/', 'https://twitter.com/dani_stoffers/status/1633056771051749376', 'https://twitter.com/securityaffairs/status/1633030644539195393', 'https://twitter.com/cahlberg/status/1632993055820197890', 'https://twitter.com/secIT_DE/status/1633177845391577089', 'https://twitter.com/securityaffairs/status/1632878280985440257', 'https://twitter.com/cybersecboardrm/status/1632839634026635264', 'https://twitter.com/ransomwaremap/status/1632822747343486977', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2023-police-take-action/', 'https://elpais.com/https:/elpais.com/tecnologia/2023-03-12/el-ciberataque-al-hospital-clinic-de-barcelona-desde-dentro-ha-sido-como-hacer-un-viaje-en-el-tiempo.html', 'https://securityaffairs.com/143398/breaking-news/security-affairs-newsletter-round-410-by-pierluigi-paganini.html', 'https://twitter.com/douglittlejr/status/1633467375050735616', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-21/el-hospital-clinic-reconoce-ahora-que-el-ciberataque-podria-comprometer-la-confidencialidad-de-los-datos-de-pacientes-y-trabajadores.html', 'https://twitter.com/AlexMartin/status/1639241047816511501', 'https://www.databreaches.net/es-clinic-hackers-threaten-to-destroy-information-about-patients-with-infectious-diseases/', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-04-08/ciberataque-en-el-clinic-por-que-el-hospital-no-estaba-integrado-en-la-agencia-de-ciberseguridad-si-existia-un-plan-para-ello.html']
2,035
Pro-Russian hacker group NoName057(16) disrupted the websites of an Italian company and state institutions on 6 March 2023
The pro-Russian hacker group NoName057(16) disrupted the websites of an Italian company and state institutions on 6 March 2023, as disclosed by the hackers themselves. The affected targets include the Italian telecommunications company TIM, the Carabinieri, the Ministry of Labour and the High Council of the Judiciary. The group managed to cause short downtimes of a few minutes and delays for access to some of the sites. The High Council of the Judiciary had announced increased DDoS protections following an earlier wave of disruption attempts on 21 February that had knocked its website offline for several hours.
2023-03-06
2023-03-06
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized; Attack on critical infrastructure target(s)
null
Incident disclosed by attacker
Disruption
[['High Council of the Judiciary'], ['TIM'], ['Ministry of Labour and Social Policies (Italy)'], ['Carabinieri']]
['Italy', 'Italy', 'Italy', 'Italy']
[['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU']]
[['State institutions / political system'], ['Critical infrastructure'], ['State institutions / political system'], ['State institutions / political system']]
[['Judiciary'], ['Telecommunications'], ['Government / ministries'], ['Military']]
['NoName057(16)']
['Russia']
['Non-state-group']
['Hacktivist(s)']
1
2023-03-06 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
NoName057(16)
null
Russia
NoName057(16)
Russia
Non-state-group
Hacktivist(s)
['https://t.me/noname05716/2195', 'https://t.me/noname05716/2196', 'https://t.me/noname05716/2197', 'https://t.me/noname05716/2198']
System / ideology; Territory; Resources; International power
System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection
Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine
Yes / HIIK intensity
HIIK 5
0
null
null
null
null
null
No
null
Not available
Network Denial of Service
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Not available
none
none
1
Moderate - high political importance
1
Minor
5
Day (< 24h)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
4
null
0
Not available
0
euro
None/Negligent
Due diligence; Sovereignty
;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.ilsole24ore.com/art/gli-hacker-filorussi-noname057-hanno-attaccato-la-seconda-volta-l-italia-AEZ8HxyC', 'https://t.me/noname05716/2195', 'https://t.me/noname05716/2196', 'https://t.me/noname05716/2197', 'https://t.me/noname05716/2198', 'https://socradar.io/dark-web-profile-noname05716/']
2,036
Unknown actors gained access to vulnerable routers used by a municipal government and medium-sized businesses using HiatusRAT since at least June 2022
Unknown actors gained access to vulnerable routers used by a municipal government and medium-sized businesses using HiatusRAT since at least June 2022, according to technical reports by Black Lotus Labs. The affected businesses are consulting firms, IT service providers, and pharmaceutical companies from Latin America, Europe, and North America. Out of more than 4,100 exposed connected routers, at least 100 showed signs of compromise with the possibility of data exfiltration. The vulnerable routers are DrayTek Vigor models 2960 and 3900. In addition to the opportunistic collection of data, the infiltrations were designed to faciliate the creation of a proxy network to stage further attacks.
2022-06-01
null
Attack on (inter alia) political target(s), not politicized; Attack on critical infrastructure target(s)
null
Incident disclosed by IT-security company
Data theft; Hijacking with Misuse
[['Not available'], ['Not available'], ['Not available']]
['South America', 'North America', 'North America']
null
[['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']]
[['Civil service / administration', 'Health', ''], ['Civil service / administration', 'Health', ''], ['Civil service / administration', 'Health', '']]
null
null
null
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
3
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
Not available
0
Not available
0
Not available
0
euro
Not available
Cyber espionage; Sovereignty
;
Not available
0
null
null
null
null
null
null
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://twitter.com/UK_Daniel_Card/status/1632759937741750273', 'https://twitter.com/Cyber_O51NT/status/1632758899156856833', 'https://www.bleepingcomputer.com/news/security/new-malware-infects-business-routers-for-data-theft-surveillance/', 'https://thehackernews.com/2023/03/new-hiatusrat-malware-targets-business.html', 'http://news.lumen.com/2023-03-06-Black-Lotus-Labs-uncovers-another-new-malware-that-targets-compromised-routers', 'https://blog.lumen.com/new-hiatusrat-router-malware-covertly-spies-on-victims/', 'https://www.darkreading.com/threat-intelligence/hiatusrat-campaign-draytek-gear-cyber-espionage-proxy-control', 'https://twitter.com/Dinosn/status/1632969801759961088', 'https://twitter.com/cybersecboardrm/status/1633195187467063297', 'https://www.techrepublic.com/article/hiatus-malware-campaign-targets-routers/']
2,038
Chinese state-sponsored hacking group Sharp Panda gained access to the networks of a Southeast Asian government using the Soul backdoor beginning in late 2022
Sharp Panda, a Chinese state-sponsored hacking group, gained access to the networks of a Southeast Asian government using the Soul backdoor beginning in late 2022, according to a technical report by Israeli IT security company Check Point Research. Early stages of the attack, Check Point found, correspond with activity against Southeast Asian governments identified as Sharp Panda and tied to China with medium to high confidence in 2021; CheckPoint researchers attributed this attack to Sharp Panda in 2022. Some of the organizations targeted with the previously unattributed Soul Framework also showed signs of compromise with APT10 and APT30 tools during the same timeframe. Considering tool sharing practices among Chinese groups, Check Point continues to track Sharp Panda as a separate cluster and suspects the actors behind the Soul Framework to be a Chinese-backed or possibly nation-state group.
2022-01-01
null
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized
Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ;
Incident disclosed by IT-security company
Data theft; Hijacking with Misuse
[['Not available']]
['Southeast Asia (region)']
null
[['State institutions / political system']]
[['Government / ministries']]
['Sharp Panda']
['China']
['Non-state actor, state-affiliation suggested']
null
1
2023-03-07 00:00:00
Technical report (e.g., by IT-companies, Citizen Lab, EFF)
IT-security community attributes attacker
Check Point Research
null
Israel
Sharp Panda
China
Non-state actor, state-affiliation suggested
null
['https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/']
Unknown
Unknown
null
Unknown
null
0
null
null
null
null
null
No
null
Phishing
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
5
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
1-10
1
1-10
1
Not available
0
euro
Indirect (knowingly sanctioning / ordering / ideological / material support by official members of state entities/agencies/units for officially non-state-actors)
Cyber espionage; Sovereignty
;
Not available
0
null
null
null
null
null
Not available
null
Countermeasures under international law justified (state-atttribution & breach of international law)
null
['https://twitter.com/Cyber_O51NT/status/1633125321821286401', 'https://www.bleepingcomputer.com/news/security/new-malware-variant-has-radio-silence-mode-to-evade-detection/', 'https://www.hackread.com/sharp-panda-china-soulsearcher-malware/', 'https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/', 'https://twitter.com/780thC/status/1633077714352582657', 'https://twitter.com/Dinosn/status/1633070796636667906', 'https://thehackernews.com/2023/03/sharp-panda-using-new-soul-framework.html', 'https://securityaffairs.com/143187/apt/sharp-panda-targets-southeast-asia.html', 'https://twitter.com/securityaffairs/status/1633970924461465601', 'https://twitter.com/securityaffairs/status/1634310696409104385', 'https://securityaffairs.com/143398/breaking-news/security-affairs-newsletter-round-410-by-pierluigi-paganini.html']
2,039
Info stealer "SYS01 stealer" targeted critical government infrastructure employees via Facebook Business Accounts since November 2022
According to IT vendor Morphisec, the info stealer dubbed "SYS01 stealer" targeted critical government infrastructure employees via their Facebook Business Accounts since November 2022. This campaign was first detected in May 2022 but initially attributed to the Ducktailer Operation by ZScaler. The attackers successfully evaded discovery over a period of five months (November 2022 - March 2023).
2022-11-01
null
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by IT-security company
Data theft; Hijacking with Misuse
[['Not available']]
['Not available']
null
[['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']]
[['Government / ministries', '']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Phishing
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
3
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
Not available
0
Not available
0
Not available
0
euro
Not available
Cyber espionage
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://twitter.com/securityaffairs/status/1633235970995761153', 'https://securityaffairs.com/143162/cyber-crime/sys01-stealer-targets-critical-infrastructure.html', 'https://thehackernews.com/2023/03/sys01stealer-new-threat-using-facebook.html', 'https://blog.morphisec.com/sys01stealer-facebook-info-stealer', 'https://twitter.com/securityaffairs/status/1633606917569347584', 'https://www.hackread.com/fake-facebook-profiles-google-ads-sys01-stealer/', 'https://twitter.com/securityaffairs/status/1633971358760681473', 'https://securityaffairs.com/143398/breaking-news/security-affairs-newsletter-round-410-by-pierluigi-paganini.html', 'https://www.techrepublic.com/article/sys01-stealer-targets-facebook-business-accounts-chromium-credentials/']
2,040
Pakistani state-sponsored hacking group Transparent Tribe gained access to the Android mobile phones of 150 targeted people and stole information using the CapraRAT backdoor beginning in July 2022
The Pakistani hacking group Transparent Tribe, also known as APT36, gained access to the Android mobile phones of 150 targeted people and stole information using the CapraRAT backdoor beginning in July 2022, according to Slovakian IT security company ESET. The victims are mainly Pakistani and Indian individuals with political and military connections. Further unspecified individuals, affected by the campaign, are based in Russia, Oman, and Egypt. The hacker group used a romance scam to get their targets to install the trojanized messaging apps MeetsApp and MeetUp and then spy on their targets.
2022-07-01
null
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized
Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ;
Incident disclosed by IT-security company
Data theft; Hijacking without Misuse
[['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available']]
['Egypt', 'Oman', 'Russia', 'Pakistan', 'India']
[['MENA', 'MEA', 'AFRICA', 'NAF'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SASIA', 'SCO']]
[['Unknown'], ['Unknown'], ['Unknown'], ['Unknown', 'State institutions / political system'], ['Unknown', 'State institutions / political system']]
[[''], [''], [''], ['', 'Military'], ['', 'Military']]
['APT36/Transparent Tribe/Mythic Leopard/C-Major']
['Pakistan']
['Non-state actor, state-affiliation suggested']
['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)']
1
2023-03-07 00:00:00
Technical report (e.g., by IT-companies, Citizen Lab, EFF)
IT-security community attributes attacker
ESET
null
Slovakia
APT36/Transparent Tribe/Mythic Leopard/C-Major
Pakistan
Non-state actor, state-affiliation suggested
Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)
['https://twitter.com/ESETresearch/status/1633132257228517376', 'https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/']
International power
Unknown
null
Unknown
null
0
null
null
null
null
null
No
null
Phishing; Trusted Relationship
Not available
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Low
7
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
51-200
150
1-10
5
Not available
0
euro
Indirect (knowingly sanctioning / ordering / ideological / material support by official members of state entities/agencies/units for officially non-state-actors)
Cyber espionage; Human rights; Sovereignty
Non-state actors; Civic / political rights;
Not available
0
null
null
null
null
null
Not available
null
Countermeasures under international law justified (state-atttribution & breach of international law)
null
['https://twitter.com/ESETresearch/status/1633132257228517376', 'https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/', 'https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/', 'https://thehackernews.com/2023/03/transparent-tribe-hackers-distribute.html', 'https://twitter.com/IT_SecGuru/status/1633120375985823745', 'https://www.govinfosecurity.com/transparent-tribe-spread-caprarat-via-fake-messaging-apps-a-21398', 'https://securitymea.com/2023/03/09/eset-reveals-cyberespionage-honey-trap-campaign-target-officials-in-india-pakistan-and-middle-east/', 'https://www.welivesecurity.com/videos/apt-hackers-honeytrap-ensnare-targets-week-security-tony-anscombe/']
2,041
Qilin ransomware group targeted elderly care facility in the Netherlands on 17 February 2022
The Qilin ransomware group targeted Attent Zorg en Behandeling, an elderly care facility in the Netherlands, on 17 February 2022, the affected organization announced on its website. The attacker stole passport information of physicians, nurses, and physiotherapists and later published them online. According to the facility, a significant portion of the affected systems were restored within three days after the attack, allowing it to resume its telephone service and regain access to systems managing client dossiers, finances, and personnel.
2022-02-17
2022-02-17
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware
[['Attent Zorg en Behandeling']]
['Netherlands']
[['EUROPE', 'NATO', 'EU', 'WESTEU']]
[['Critical infrastructure']]
[['Health']]
['Qilin Ransomware Group']
['Not available']
['Non-state-group']
['Criminal(s)']
1
2023-03-01 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
Qilin Ransomware Group
null
null
Qilin Ransomware Group
null
Non-state-group
Criminal(s)
['https://www.security.nl/posting/788375/Ransomwaregroep+publiceert+paspoorten+artsen+Gelderse+oudereninstelling']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Exploit Public-Facing Application
Data Exfiltration; Data Encrypted for Impact
Not available
true
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
6
Moderate - high political importance
6
Low
10
Days (< 7 days)
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
null
0
Not available
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Civic / political rights; ;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://twitter.com/Cyberwarzonecom/status/1633201133819666435', 'https://cyberwarzone.com/qilin-ransomware-attack-elderly-care-facility-breached-and-confidential-data-leaked-online/', 'https://www.attentzorgenbehandeling.nl/nieuws/update-ongeautoriseerde-toegang-it-systemen', 'https://www.rtlnieuws.nl/nieuws/nederland/artikel/5370082/attent-zorg-behandeling-hack-ransomware-paspoorten-datalek', 'https://www.security.nl/posting/788375/Ransomwaregroep+publiceert+paspoorten+artsen+Gelderse+oudereninstelling']
2,042
BianLian ransomware group targeted US-based Northeast Surgical Group in January 2022
BianLian ransomware group targeted US-based Northeast Surgical Group (NESG) in January 2022. After BianLian added an unnamed medical group to their leak site, incident aggregator DataBreaches claimed to have identified it as NESG, though the company did not respond to repeated request for comment. Data from NESG surfaced on BreachForums in early February and BianLian's leak site. NESG addressed the diclosures affecting 15,300 patients on 6 March, in an incident notice on its website. Public reporting remains unclear about whether BianLian only stole and leaked the data or if the group also encrypted data on targeted systems.
2023-01-08
2023-01-01
Attack on critical infrastructure target(s)
null
Incident disclosed by attacker
Data theft & Doxing; Hijacking with Misuse
[['Northeast Surgical Group (NESG)']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Health']]
['BianLian Ransomware Group']
['Not available']
['Non-state-group']
['Criminal(s)']
1
2023-01-01 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
BianLian Ransomware Group
null
null
BianLian Ransomware Group
null
Non-state-group
Criminal(s)
['https://www.databreaches.net/northeast-surgical-group-notifies-15298-patients-of-a-hipaa-breach-but-doesnt-tell-them-their-information-has-been-dumped/']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
8
No system interference/disruption
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Civic / political rights; ;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.databreaches.net/northeast-surgical-group-notifies-15298-patients-of-a-hipaa-breach-but-doesnt-tell-them-their-information-has-been-dumped/', 'https://www.nesg.com/index.php/notice-of-cybersecurity-incident/', 'https://breached.vc/Thread-Nesk-Medical-organization-USA']
2,043
Website of German defence company Rheinmetall targeted by DDoS attack on 7 March 2022
The website of the German defence company Rheinmetall was targeted by DDoS attack on 7 March 2022. Apart from a short unavailability of the website, no further impact has been recorded, according to Rheinmetall. German media sources relate this incident and other potential hacker activities against the company to its involvement in weapons delivery to Ukraine.
2023-03-07
2023-03-07
Attack on critical infrastructure target(s)
null
Incident disclosed by media (without further information on source)
Disruption
[['Rheinmetall']]
['Germany']
[['EUROPE', 'NATO', 'EU', 'WESTEU']]
[['Critical infrastructure']]
[['Defence industry']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
System / ideology; Territory; Resources; International power
System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection
Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine
Yes / HIIK intensity
HIIK 5
0
null
null
null
null
null
No
null
Not available
Network Denial of Service
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Not available
none
none
1
Moderate - high political importance
1
Low
6
Day (< 24h)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
null
0
null
0
euro
Not available
Sovereignty
null
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.sueddeutsche.de/wirtschaft/rheinmetall-cyberattacke-gegen-ruestungsunternehmen-1.5764561']
2,044
US-based Northern Essex Community College was hit by cyber attack in early February 2023
The US-based Northern Essex Community College was hit by cyber attack in early February 2023. According to a spokesperson, it is unclear if the unauthorized access the college detected around 1 March was part of a ransomware attack, but several systems were no longer working. The spokesperson further claimed that the college does "not have evidence of any personal data being compromised". The college suspended classes for two days in response to the incident.
2023-03-01
null
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by victim
Disruption; Hijacking with Misuse
[['Northern Essex Community College (NECC)']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Civil service / administration']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Not available
Not available
true
Not available
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
6
Days (< 7 days)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Economic, social and cultural rights; ;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://therecord.media/northern-essex-community-college-cyberattack', 'https://northernessex.cc/2023/03/necc-announcement-mar-5-2023/']
2,045
Medusa ransomware group targeted Minneapolis Public Schools (MPS) in February 2023
The Medusa ransomware group targeted Minneapolis Public Schools (MPS) in February 2023, according to an almost hour-long video from 7 March in which the group reveals stolen data, such as emails, student grades, building layouts, and payroll information. MPS reported on 1 March it had been able to restore systems and no ransom had been paid.
2023-02-01
2023-02-01
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by victim
Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware
[['Minneapolis Public Schools (MPS)']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Civil service / administration']]
['Medusa Ransomware Group']
['Not available']
['Non-state-group']
['Criminal(s)']
1
2023-03-07 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
Medusa Ransomware Group
null
null
Medusa Ransomware Group
null
Non-state-group
Criminal(s)
['https://twitter.com/chuksjonia/status/1633150165979725825']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration; Data Encrypted for Impact
Not available
true
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
5
Moderate - high political importance
5
Medium
11
Weeks (< 4 weeks)
Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
null
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Civic / political rights; ;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://twitter.com/vxunderground/status/1633150837143883776', 'https://www.bleepingcomputer.com/news/security/medusa-ransomware-gang-picks-up-steam-as-it-targets-companies-worldwide/', 'https://twitter.com/chuksjonia/status/1633150165979725825', 'https://www.databreaches.net/medusa-claims-responsibility-for-minneapolis-public-schools-encryption-event-provides-proof-of-how-much-data-they-accessed/', 'https://mpls.k12.mn.us/technology_incident_update.html', 'https://mpls.k12.mn.us/mps_systems_outage_update_and_monday_s_return_to_schools.html', 'https://mpls.k12.mn.us/mps_systems_outage_update.html', 'https://www.bleepingcomputer.com/news/security/ransomware-gang-posts-video-of-data-stolen-from-minneapolis-schools/', 'https://therecord.media/ransomware-minneapolis-public-schools-stolen-data', 'https://twitter.com/vxunderground/status/1633125378347728896', 'https://www.databreaches.net/minneapolis-public-schools-systems-restored-no-ransom-paid/', 'https://therecord.media/minneapolis-public-schools-still-investigating-what-caused-encryption-event/', 'https://tarnkappe.info/lesetipps/lesetipps-und-wann-klopfen-die-hacker-auch-bei-euch-an-die-tuer-265998.html', 'https://www.databreaches.net/minneapolis-public-schools-tap-dances-around-telling-parents-and-employees-what-really-happened/', 'https://twitter.com/ransomwaremap/status/1629415883318730752', 'https://twitter.com/chuksjonia/status/1633156655742431233', 'https://twitter.com/nicoleperlroth/status/1633871105701343233', 'https://www.darkreading.com/threat-intelligence/medusa-gang-video-minneapolis-school-district-ransomed-data', 'https://twitter.com/cybersecboardrm/status/1634235221687308289', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2023-police-take-action/', 'https://twitter.com/ImposeCost/status/1634595846422511618', 'https://research.checkpoint.com/2023/13th-march-threat-intelligence-report/', 'https://www.databreaches.net/whats-new-in-ransomware-gang-pressure-tactics-not-as-much-as-you-might-think/', 'https://www.bleepingcomputer.com/news/security/medusa-ransomware-claims-attack-on-open-university-of-cyprus/']
2,046
Pro-Russian hackers targeted website of Canadian TD Bank with DDoS attacks on 26 February 2023
Pro-Russian hackers targeted the website of the Canadian TD Bank with DDoS attacks on 26 February 2023, according to a statement on Telegram. The website was not available for several hours on that day. Reporting on the incident, Journal de Montreal highlighted Canada's announcement from 24 February of a $32.5 million support package for Ukraine to help secure and stabilise the country as a potential motivation for the attack.
2023-02-26
2023-02-26
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on critical infrastructure target(s)
null
Incident disclosed by attacker
Disruption
[['TD Bank']]
['Canada']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Finance']]
['We are Russian Hackers Community']
['Not available']
['Non-state-group']
['Hacktivist(s)']
2
2023-02-26; 2023-02-25
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
IT-security community attributes attacker; Attacker confirms
Alexis Rapin (Cybersecurits researcher at RDandurand, Canada); We are Russian Hackers Community
null
Canada; Not available
We are Russian Hackers Community; We are Russian Hackers Community
null
Non-state-group; Non-state-group
Hacktivist(s); Hacktivist(s)
['https://twitter.com/alexis_rapin/status/1629881585590755331?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1629881585590755331%7Ctwgr%5E1a66aac67bec116ee0ecf8ac677ff84f2a13d4b3%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.journaldemontreal.com%2F2023%2F03%2F06%2Fcyberattaque-des-pirates-russes-auraient-attaque-la-banque-td', 'https://t.me/russianhackerscommunity/266']
System / ideology; Territory; Resources; International power
System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection
Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine
Yes / HIIK intensity
HIIK 5
0
null
null
null
null
null
No
null
Not available
Network Denial of Service
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Not available
none
none
1
Moderate - high political importance
1
Minor
5
Day (< 24h)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Due diligence; Sovereignty
;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://twitter.com/Cyberknow20/status/1633059293430956034', 'https://t.me/russianhackerscommunity/266', 'https://twitter.com/alexis_rapin/status/1629881585590755331?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1629881585590755331%7Ctwgr%5E1a66aac67bec116ee0ecf8ac677ff84f2a13d4b3%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.journaldemontreal.com%2F2023%2F03%2F06%2Fcyberattaque-des-pirates-russes-auraient-attaque-la-banque-td', 'https://twitter.com/UK_Daniel_Card/status/1629904352629469189']
2,047
Unidentified hackers stole sensitive data from DC Health Link servers in early March 2023
Unidentified hackers stole sensitive personal information from DC Health Link servers, an organisation that administers the health care plans of members of the US House of Representatives, their staff and families, in early March 2023. As reported by the DailyCaller on 8 March, the US House Chief Administrative Officer disclosed the incident in an email to House members. According to BleepingComputer, data was offered for sale on a hacker forum on 6 March by a user named IntelBroker, who claims it was stolen during a breach of the DC Health Benefit Exchange Authority that manages the DC Health Link health insurance marketplace. A sampling of the stolen files found that the dataset contained sensitive personal information on about 170,000 people, including names, birth dates, home addresses, Social Security numbers and health insurance details. Among them, according to current figures, more than two dozen current or former members of Congress are also said to have been affected. The FBI and the Capitol Police are still investigating the incident. Another hacker calling himself "Denfur" also claims that the attack was born out of Russian patriotism, but independent verification is still pending.
2023-03-01
2023-03-07
Attack on critical infrastructure target(s)
null
Incident disclosed by attacker
Data theft & Doxing; Hijacking with Misuse
[['DC Health Link']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Non-state-group']
['Hacktivist(s)']
1
2023-03-06 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attribution by third-party
IntelBroker
null
null
null
null
Non-state-group
Hacktivist(s)
['https://www.bleepingcomputer.com/news/security/fbi-investigates-data-breach-impacting-us-house-members-and-staff/']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
8
No system interference/disruption
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Human rights; Sovereignty
Civic / political rights;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.bleepingcomputer.com/news/security/fbi-investigates-data-breach-impacting-us-house-members-and-staff/', 'https://twitter.com/henryrodgersdc/status/1633575335869521921', 'https://www.hackread.com/dc-health-link-hackers-congress-members-details/', 'https://www.darkreading.com/application-security/us-lawmakers-cyberattacks-physical-harm-dc-health-link-breach', 'https://cyberscoop.com/dc-health-exchange-breach-congress-defense-official/', 'https://twitter.com/Dinosn/status/1634156211518992387', 'https://www.wired.com/story/catholic-priest-doxing-security-roundup/', 'https://research.checkpoint.com/2023/13th-march-threat-intelligence-report/', 'https://cyberscoop.com/dc-health-data-posted-online/', 'https://krebsonsecurity.com/2023/03/feds-charge-ny-man-as-breachforums-boss-pompompurin/', 'https://www.bleepingcomputer.com/news/security/alleged-breachforums-owner-pompompurin-arrested-on-cybercrime-charges/', 'https://www.databreaches.net/was-there-a-rush-to-arrest-pompompurin-the-owner-of-breachforums-if-so-why/', 'https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/', 'https://www.databreaches.net/at-least-17-members-of-congress-had-sensitive-information-exposed-in-data-breach/', 'https://cyberscoop.com/dc-health-link-breach-russia-hacker-congress/', 'https://www.govinfosecurity.com/dc-health-link-facing-lawsuits-in-hack-affecting-congress-a-21496', 'https://www.databreaches.net/the-breachforums-case-the-hhs-oig-did-what-why/', 'https://www.wired.com/story/india-activist-manhunt-sikh-activist/', 'https://twitter.com/aselawaid/status/1639447799896088577', 'https://cyberscoop.com/breachforums-arrest-cybercrime-underground/']
2,048
North Korean state-sponsored hacking group UNC2970 targeted US and European media and technology companies since at least June 2022
The North Korea-linked APT UNC2970 has launched phishing-based espionage campaigns against US and European media and technology companies since at least mid-2022, based on observations by Mandiant from June 2022. Mandiant, with high confidence, identified UNC2970 as UNC577, an activity cluster commonly associated with the Lazarus Group. Also known as Temp.Hermit, UNC577 has been active since at least 2013 and is suspected of sharing malware and tools with other North Korean threat actors. UNC2970 conducted its phishing campaign via fraudulent job offerings and has more recently utilised LinkedIn to approach victims. During one of the operations tracked by Mandiant targeting security researchers, UNC2970 deployed three new malware families (TOUCHMOVE, SIDESHOW, and TOUCHSHIFT).
2022-06-01
null
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals
Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated
Incident disclosed by IT-security company
Hijacking without Misuse
[['Not available'], ['Not available']]
['Europe (region)', 'United States']
[[], ['NATO', 'NORTHAM']]
[['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']]
null
['TEMP.Hermit/ UNC577 < Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Lab 110)']
["Korea, Democratic People's Republic of"]
['Non-state actor, state-affiliation suggested']
['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)']
2
2023-03-09; 2022-11-29
Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF)
IT-security community attributes attacker; IT-security community attributes attacker
Mandiant; Mandiant
Mandiant; nan
United States; United States
TEMP.Hermit/ UNC577 < Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Lab 110); TEMP.Hermit/ UNC577 < Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Lab 110)
Korea, Democratic People's Republic of; Korea, Democratic People's Republic of
Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested
Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case);
['https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970', 'https://www.mandiant.com/resources/blog/mapping-dprk-groups-to-government']
International power
Unknown
null
Unknown
null
0
null
null
null
null
null
No
null
Phishing
Not available
Not available
false
Not available
Not available
Hijacking, not used - empowerment (incident scores 1 point in intensity)
none
none
1
Moderate - high political importance
1
Minor
3
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
Not available
0
Not available
0
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970', 'https://www.mandiant.com/resources/blog/lightshift-and-lightshow', 'https://www.mandiant.com/resources/blog/mapping-dprk-groups-to-government', 'https://twitter.com/cybereason/status/1634290029030789149', 'https://twitter.com/Dinosn/status/1634264331121467415', 'https://twitter.com/ImposeCost/status/1634030788512477184', 'https://cyberscoop.com/north-korea-hackers-linkedin-phishing/', 'https://thehackernews.com/2023/03/north-korean-unc2970-hackers-expands.html', 'https://twitter.com/obiwan666/status/1634480773813223424', 'https://twitter.com/jasonnurse/status/1634466599146082305', 'https://twitter.com/jaysonstreet/status/1634417033818537984', 'https://www.bleepingcomputer.com/news/security/security-researchers-targeted-with-new-malware-via-job-offers-on-linkedin/', 'https://twitter.com/randomuserid/status/1634588793842937858', 'https://www.darkreading.com/application-security/north-korean-hackers-targeting-security-researchers', 'https://www.govinfosecurity.com/north-korean-hackers-find-value-in-linkedin-a-21424', 'https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/a-growing-goldmine-your-linkedin-data-abused-for-cybercrime']
2,050
BianLian ransomware group targeted city of Waynesboro stealing government information and police data in January 2023
The BianLian ransomware group targeted the city of Waynesboro, Virginia (USA), stealing government and police data. The incident potentially matches with malicious activity the city administration was informed about in January 2023. In an online post, BianLian claimed to be in possession of more than 350GB of data including internal police files, such as investigation documentation and personal staff data. Public reporting did not immediately disclose whether attackers also succeeded in encrypting data on target systems. According to the city's manager, the cyberattack has been remediated and protective measures put in place to prevent future attacks.
2023-01-01
2023-01-01
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by attacker
Data theft; Hijacking with Misuse
[['Waynesboro, Virginia']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system', 'State institutions / political system']]
[['Civil service / administration', 'Police']]
['BianLian Ransomware Group']
['Not available']
['Non-state-group']
['Criminal(s)']
1
2023-03-01 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
BianLian
null
null
BianLian Ransomware Group
null
Non-state-group
Criminal(s)
['https://twitter.com/BrettCallow/status/1632884957663354880']
Not available
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Not available; Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
Not available
Not available
4
Moderate - high political importance
4
Low
6
No system interference/disruption
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
0
1-10
1
Not available
0
euro
None/Negligent
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/city-of-waynesboro-targeted-in-cyber-attack/', 'https://www.scmagazine.com/brief/ransomware/virginia-city-claimed-to-be-attacked-by-bianlian-ransomware', 'https://www.nbc29.com/2023/03/08/city-waynesboro-targeted-cyber-attack/', 'https://augustafreepress.com/news/ransomware-group-claims-it-has-infiltrated-waynesboro-city-government-files/', 'https://twitter.com/BrettCallow/status/1632884957663354880']
2,053
Healthcare Clinic Santa Chiara in Switzerland hit by ransomware attack in February 2023
Unknown actors targeted the Clinica Santa Chiara (Locarno, Switzerland) with ransomware during the week of 27 February 2023. The clinic did not pay the ransom and saw a significant portion of its data encrypted. The clinic responded by isolating IT systems to prevent any further damage, also clarifying that no health data had been compromised in the course of the attack.
2023-01-01
2023-01-01
Attack on critical infrastructure target(s)
null
Incident disclosed by media (without further information on source)
Disruption; Hijacking with Misuse; Ransomware
[['Clinica Santa Chiara']]
['Switzerland']
[['EUROPE', 'WESTEU']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
Not available
null
Not available
Data Encrypted for Impact
Not available
true
Not available
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
8
Days (< 7 days)
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
No justification under IL
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://twitter.com/Dennis_Kipker/status/1634198361862488064', 'https://www.redhotcyber.com/post/attacco-informatico-alla-clinica-santa-chiara-di-locarno-i-dati-esfiltrati-non-contengono-dati-sanitari/', 'https://www.inside-it.ch/tessiner-privatklinik-opfer-eines-cyberangriffs-20230308']
2,056
Vice Society ransomware group attacked Berkeley County School System in February 2023
The Vice Society ransomware group attacked the Berkeley County School System in West Virginia (USA), on 3 February 2023. Classes had to be suspended for one day to address the incident. Following Berkeley County Schools' refusal to pay the ransom, Vice Society leaked internal data, including employee social security numbers, on 10 March 2023, as reported by DataBreaches. Published files also included details about behavior intervention plans and functional behavior assessments for certain students that may reveal sensitive information about students, such as diagnoses, medications, or home issues.
2023-02-03
2023-03-10
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by victim
Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware
[['Berkeley County Schools']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Civil service / administration']]
['Vice Society']
['Not available']
['Non-state-group']
['Criminal(s)']
1
2023-03-10 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
Vice Society
null
null
Vice Society
null
Non-state-group
Criminal(s)
['https://www.databreaches.net/highly-sensitive-files-from-berkeley-county-schools-dumped-by-ransomware-gang/']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
true
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
6
Moderate - high political importance
6
Low
10
Days (< 7 days)
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/highly-sensitive-files-from-berkeley-county-schools-dumped-by-ransomware-gang/', 'https://www.databreaches.net/highly-sensitive-files-from-berkeley-county-schools-dumped-by-ransomware-gang/', 'https://www.berkeleycountyschools.org/cms/lib/WV01000962/Centricity/Domain/1/BCS%20Notice%20of%20Data%20Breach.pdf', 'https://twitter.com/UK_Daniel_Card/status/1634604262029246464', 'https://therecord.media/minneapolis-public-schools-still-investigating-what-caused-encryption-event/', 'https://therecord.media/west-virginia-students-returning-to-class-after-days-long-outage-following-cyberattack/', 'https://www.smore.com/8qzg2', 'https://twitter.com/BerkCoSchoolsWV/status/1621526301378240521?ref%5Fsrc=twsrc%5Etfw', 'https://www.smore.com/5r4gd?utm%5Fsource=twitter&utm%5Fmedium=social&utm%5Fcontent=ap%5Fqs69x4ndda', 'https://www.smore.com/x7whs?utm%5Fsource=twitter&utm%5Fmedium=social&utm%5Fcontent=ap%5Ffz8zjo13nc', 'https://www.smore.com/1quse', 'https://research.checkpoint.com/2023/13th-march-threat-intelligence-report/']
2,057
Saint-Pierre Hospital in Brussels hit by cyberattack in March 2023
Unknown attackers launched a cyberattack against the Saint-Pierre Hospital in Brussels on 11 March 2023. In line with the hospital's incident response plan, servers managing electronic patient files were shut down. For the first half of the day, the emergency room was closed and ambulances redirected, to allow staff to maintain operations, while the hospital was running on a paper-based system. The incident further limited access to patient files. By the end of the day, service of the telephone/information systems and the emergency room had been restored.
2023-03-10
2023-03-11
Attack on critical infrastructure target(s)
null
Incident disclosed by media (without further information on source); Incident disclosed by victim
Disruption; Hijacking with Misuse
[['CHU Saint-Pierre']]
['Belgium']
[['EUROPE', 'EU', 'NATO', 'WESTEU']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Not available
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Low
8
Day (< 24h)
Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data
1-10
1
null
0
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://twitter.com/ransomwaremap/status/1634639503259320321', 'https://www.lesoir.be/500384/article/2023-03-11/retour-la-normale-au-chu-saint-pierre-cible-dune-cyberattaque']
2,061
ZOLL Medical hit by hack-and-leak operation in January 2023
ZOLL Medical, a healthcare firm, was targeted with a cyberattack from unknown actors on 28 January 2023, with private health information being leaked on or around 2 February 2023, according to DataBreaches. This leak contained data of more than one million patients, including social security numbers, date of birth, and adresses - but also affected personal health information, such as the use or consideration of use of a ZOLL-manufactured wearable defibrillator. ZOLL did not provide further information regarding the type of the attack or whether the company had received any ransom demands. A few weeks after the incident became public, at least seven class action lawsuits were filed against the company, alleging Zoll negligently failed to protect sensitive information of individuals.
2023-01-28
2023-02-02
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft & Doxing; Hijacking with Misuse
[['ZOLL Medical']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
8
No system interference/disruption
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
1
2023-03-15 00:00:00
Other legal measures on national level (e.g. law enforcement investigations, arrests)
null
United States
Robert Smith
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/zoll-medical-notifying-1004443-patients-of-data-breach-hipaa/', 'https://www.govinfosecurity.com/heart-device-maker-says-hack-affected-1-million-patients-a-21425', 'https://www.govinfosecurity.com/device-maker-zoll-facing-7-lawsuits-in-wake-breach-a-21522', 'https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/zoll-lawsuit-by-robert-smith-3-15-23.pdf']
2,063
Cyber-espionage hacking group Dark Pink gained access to networks of Southeast Asian military targets and governments beginning in February 2023
The cyber-espionage hacking group Dark Pink gained access to networks of Southeast Asian military targets and governments beginning on 1 February 2023, according to a technical report by IT security company EclecticIQ. Spearphishing lures for breaking into the networks were centered on ASEAN relations with European countries. The report attributed this incident with a high degree of probability to the Dark Pink hacking group based on strong operational overlaps with activity that Group-IB had associated with Dark Pink in January. Building on these previously observed patterns, Dark Pink in the present case deployed an advanced version of the KamiKakaBot malware with improved detection evasion features. EclecticIQ assessed with low confidence that Dark Pink is operated by a Chinese group.
2023-02-01
null
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by IT-security company
Data theft; Hijacking with Misuse
[['Not available']]
['Southeast Asia (region)']
null
[['State institutions / political system', 'State institutions / political system']]
[['Government / ministries', 'Military']]
['Dark Pink']
['China']
['Unknown - not attributed']
null
1
2023-03-10 00:00:00
Technical report (e.g., by IT-companies, Citizen Lab, EFF)
IT-security community attributes attacker
EclecticIQ
null
Netherlands
Dark Pink
China
Unknown - not attributed
null
['https://blog.eclecticiq.com/dark-pink-apt-group-strikes-government-entities-in-south-asian-countries']
International power
Unknown
null
Unknown
null
0
null
null
null
null
null
No
null
Phishing
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
3
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
Not available
0
Not available
0
Not available
0
euro
Not available
Cyber espionage; Sovereignty
;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://thehackernews.com/2023/03/kamikakabot-malware-used-in-latest-dark.html', 'https://blog.eclecticiq.com/dark-pink-apt-group-strikes-government-entities-in-south-asian-countries', 'https://www.govinfosecurity.com/dark-pink-apt-group-very-likely-back-in-action-a-21426', 'https://securityaffairs.com/143415/apt/dark-pink-apt-south-asia.html', 'https://securityaffairs.com/143707/breaking-news/security-affairs-newsletter-round-411-by-pierluigi-paganini.html', 'https://twitter.com/securityaffairs/status/1635381821646200849']
2,064
Unknown hackers breached the Death Registry System of Hawaii in January 2023
Unknown hackers breached the Electronic Death Registry System (EDRS) of Hawaii in January 2023. On 10 March, officials of Hawaii's Department of Health stated that the families of the affected should remain vigilant about potential misuse of the compromised data. Although death certificates were not accessed, the data contains sensitive personal information, such as names, social security numbers, and information on the cause of death. The attack was orchestrated through the use of a compromised account belonging to a medical certifier that had left their job in 2021. According to cybersecurity firm Mandiant, the account information was sold on the dark web. Although the attacker has not yet been publicly identified, the Hawaii Department of Health disclosed that two IP adresses from Kentucky, USA, and the Netherlands had been tied to suspicious access patterns of the system.
2023-01-20
2023-01-01
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by victim
Data theft; Hijacking with Misuse
[['Hawaii State Department of Health']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Government / ministries']]
null
null
null
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
1
2023-03-09 00:00:00
State Actors: Preventive measures
Awareness raising
United States
Department of Health, State of Hawaii (USA)
No
null
Valid Accounts
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
6
No system interference/disruption
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Human rights; Sovereignty
Civic / political rights;
Not available
0
null
null
null
null
null
null
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://therecord.media/hawaii-death-records-system-data-breach-notification', 'https://health.hawaii.gov/news/newsroom/department-of-health-to-send-notifications-regarding-unauthorized-access-to-electronic-death-registry-system/', 'https://www.hawaiipublicradio.org/local-news/2023-03-10/cyberattack-on-states-electronic-death-registry-affected-about-3-400-records', 'https://twitter.com/InfoSecSherpa/status/1635356867101876224']
2,065
Unknown advanced threat actor targeted multiple government and government-related targets using a FortiOS vulnerability
Fortinet reports that a sudden system stop and subsequent startup failure of several FortiGate units belonging to a customer prompted an investigation of attacks aimed at a vulnerability in FortiOS (FG-IR-22-369 / CVE-2022-41328). Due to the complexity of the attack, the company is suspecting an advanced threat actor, without disclosing any further details. Exploitations of the vulnerability focus on governments and large organizations.
null
null
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by IT-security company
Data theft; Hijacking with Misuse
[['Not available']]
['Not available']
null
[['Unknown', 'State institutions / political system']]
[['', 'Government / ministries']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
Yes
null
Exploit Public-Facing Application
Data Exfiltration; Firmware Corruption; System Shutdown/Reboot
null
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
3
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
Not available
0
Not available
0
Not available
0
euro
Not available
Cyber espionage; Sovereignty
;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.bleepingcomputer.com/news/security/fortinet-new-fortios-bug-used-as-zero-day-to-attack-govt-networks/', 'https://www.fortinet.com/blog/psirt-blogs/fg-ir-22-369-psirt-analysis', 'https://www.fortiguard.com/psirt/FG-IR-22-369', 'https://thehackernews.com/2023/03/fortinet-fortios-flaw-exploited-in.html', 'https://securityaffairs.com/143458/hacking/attacks-fortinet-fortios.html', 'https://www.darkreading.com/vulnerabilities-threats/cyberattackers-continue-assault-against-fortinet-devices', 'https://www.bleepingcomputer.com/news/security/fortinet-zero-day-attacks-linked-to-suspected-chinese-hackers/', 'https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem', 'https://www.govinfosecurity.com/chinese-hackers-targeting-security-network-appliances-a-21467', 'https://securityaffairs.com/143594/apt/china-fortinet-zero-day-attacks.html', 'https://securityaffairs.com/143707/breaking-news/security-affairs-newsletter-round-411-by-pierluigi-paganini.html', 'https://thehackernews.com/2023/03/chinese-hackers-exploit-fortinet-zero.html', 'https://www.darkreading.com/attacks-breaches/attackers-probing-zero-day-vulns-edge-infrastructure']
1,899
Unknown actors gained access to the networks of British engineering company Vesuvius
Unknown actors gained access to the networks of British engineering company Vesuvius, requiring it to temporarily shut down operations, according to legally required declarations by the publicly-traded company of inside information that resulted from its ongoing investigations of the incident.
null
null
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Hijacking without Misuse
[['Vesuvius plc']]
['United Kingdom']
[['EUROPE', 'NATO', 'NORTHEU']]
[['Critical infrastructure']]
[['Critical Manufacturing']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Not available
Not available
false
Not available
Not available
Hijacking, not used - empowerment (incident scores 1 point in intensity)
none
none
1
Moderate - high political importance
1
Minor
3
No system interference/disruption
Not available
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/hackers-hit-vesuvius-uk-engineering-company-shuts-down-affected-systems/', 'https://www.londonstockexchange.com/news-article/VSVS/cyber-security-incident/15824555', 'https://www.infosecurity-magazine.com/news/uk-metalg-firm-vesuvius-cyberattack/', 'https://www.insurancejournal.com/news/international/2023/02/06/706216.htm', 'https://grahamcluley.com/hackers-hit-vesuvius-uk-engineering-company-shuts-down-affected-systems/']
2,075
Cyberattack on Latitude Financial results in theft of 300,000 customer documents in March 2023
Latitude Financial, an Australian financial lending company, was hit in March 2023 by a cyberattack from unknown actors, which resulted in the theft of over 300,000 customer documents (103,000 identification documents and 225,000 customer records). The attack originated at a third-party vendor contracted by Latitude. While active on Latitude's networks, the intruder was able to obtain an employee's login credentials, further enabling access to two other service providers, from where the identification documents and customer records were stolen.
2023-03-01
2023-03-16
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft; Hijacking with Misuse
[['Not available'], ['Latitude Financial']]
['Not available', 'Australia']
[[], ['OC']]
[['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure']]
[[''], ['Finance']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available; Valid Accounts
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
4
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
null
0
1-10
1
Not available
0
euro
None/Negligent
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/latitude-financial-hacked-as-300000-customer-identification-documents-stolen/', 'https://www.abc.net.au/news/2023-03-16/latitude-hack-300000-identity-documents-stolen/102104424', 'https://www.news.com.au/finance/business/other-industries/latitude-customers-already-having-their-accounts-hacked-day-after-company-announces-malicious-cyber-attack/news-story/331633f8555c9dd3cc9006498e30d0e7', 'https://investors.latitudefinancial.com.au/DownloadFile.axd?file=/Report/ComNews/20230316/02644401.pdf&tlga=1111382795.1679040612&adobe_mc=MCMID%3D05814445310871754421376757778548396901%7CMCORGID%3DB6D9B74F57B2FBE97F000101%2540AdobeOrg%7CTS%3D1679040624&_ga=2.261357710.202369688.1679040612-1111382795.1679040612', 'https://www.bleepingcomputer.com/news/security/latitude-cyberattack-leads-to-data-theft-at-two-service-providers/', 'https://www.databreaches.net/whats-happening-with-the-latitude-financial-cyber-attack-millions-of-customer-details-stolen-in-one-of-the-largest-known-data-breaches-in-australia/', 'https://www.govinfosecurity.com/latitude-financial-admits-14m-customer-details-breached-a-21543', 'https://www.hackread.com/latitude-financial-data-breach/', 'https://www.bleepingcomputer.com/news/security/latitude-financial-data-breach-now-impacts-14-million-customers/', 'https://securityaffairs.com/144137/data-breach/latitude-data-breach-14m-individuals.html']
2,076
Unknown actors compromised networks across various industry sectors and several countries using Trigona ransomware beginning in December 2022
Unknown actors compromised the networks of at least 15 targets in various industry sectors across several countries using the relatively unknown Trigona ransomware beginning in December 2022, according to a technical reporty by Palo Alto Networks. The 15 targets are organisations in the manufacturing, finance, construction, agriculture, marketing, and high-tech industries with a presence in the US, Italy, France, Germany, Australia, and New Zealand.
2022-12-01
null
Attack on critical infrastructure target(s)
null
Incident disclosed by IT-security company
Data theft; Disruption; Hijacking with Misuse; Ransomware
[['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available']]
['France', 'United States', 'New Zealand', 'Australia', 'Italy', 'Germany']
[['EUROPE', 'NATO', 'EU', 'WESTEU'], ['NATO', 'NORTHAM'], ['OC'], ['OC'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU', 'WESTEU']]
[['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']]
[['Finance', ''], ['Finance', ''], ['Finance', ''], ['Finance', ''], ['Finance', ''], ['Finance', '']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Unknown
null
Unknown
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration; Data Encrypted for Impact; Inhibit System Recovery; Service Stop
Not available
true
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
5
Moderate - high political importance
5
Medium
11
Weeks (< 4 weeks)
Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data
11-50
0
null
0
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://unit42.paloaltonetworks.com/trigona-ransomware-update/', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2023-shifting-to-data-extortion/', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-14th-2023-a-focus-on-stolen-data/']
2,077
Medical Group Orlando Family Physicians affected by data breach in 2021
Medical Group Orlando Family Physicians (OFP) was targeted through a phishing attack by unknown threat actors in April 2021, which enabled the theft of sensitive personal details of 447,426 patients (including health information, health insurance information, Medicare beneficiary numbers, and passport numbers). The attack compromised four employee email accounts, which were all terminated by OFP. Forensic evidence discovered during the investigation of the incident suggests the threat actor(s) intended to commit financial fraud against OFP and did not specifically pursue data on the affected individuals. In March 2023, a class action lawsuit against Orlando Family Physicians was settled for an undisclosed sum.
2021-04-15
2021-04-15
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft
[['Orlando Family Physicians']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Health']]
null
null
null
null
1
null
null
null
null
null
null
null
null
None; Unknown - not attributed
null
['https://www.businesswire.com/news/home/20210720006100/en/Orlando-Family-Physicians-Experiences-Email-Phishing-Incident']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Phishing
Account Access Removal; Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Not available
none
none
2
Moderate - high political importance
2
Low
6
No system interference/disruption
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Not available
null
Not available
0
null
null
null
null
null
null
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/orlando-family-physicians-data-breach-class-action-settlement/', 'https://www.businesswire.com/news/home/20210720006100/en/Orlando-Family-Physicians-Experiences-Email-Phishing-Incident']
2,078
Clop ransomware group suspected to have compromised Japanese Hitachi Energy using a 0-day vulnerability in Fortra GoAnywhere MFT
The Clop ransomware group is suspected to have compromised Japanese Hitachi Energy using a 0-day vulnerability (CVE-2023-0669) in Fortra GoAnywhere Managed File Transfer (MFT), gaining access to certain employee data. Hitachi Energy confirmed the incident in a press statement. Hitachi Energy appears as one of many victims targeted by Clop. The ransomware group claims to have attacked 130 organisations via third-party vendor Fortra, the majority of which has not been publicly named.
null
null
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Hijacking without Misuse
[['Hitachi Energy'], ['Fortra']]
['Japan', 'United States']
[['ASIA', 'SCS', 'NEA'], ['NATO', 'NORTHAM']]
[['Critical infrastructure'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']]
[['Energy'], ['']]
['Clop Ransomware Group']
['Not available']
['Non-state-group']
['Criminal(s)']
1
2023-03-16 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
Clop
null
null
Clop Ransomware Group
null
Non-state-group
Criminal(s)
['https://www.bleepingcomputer.com/news/security/hitachi-energy-confirms-data-breach-after-clop-goanywhere-attacks/']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
Yes
One
Exploit Public-Facing Application
Not available
Not available
false
Not available
Not available
Hijacking, not used - empowerment (incident scores 1 point in intensity)
none
none
1
Moderate - high political importance
1
Minor
4
No system interference/disruption
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Sovereignty
null
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2023-shifting-to-data-extortion/', 'https://twitter.com/thegrugq/status/1639245149288136705', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/', 'https://www.bleepingcomputer.com/news/security/hitachi-energy-confirms-data-breach-after-clop-goanywhere-attacks/', 'https://www.hitachienergy.com/news/features/2023/03/third-party-cybersecurity-incident', 'https://www.databreaches.net/hitachi-energy-latest-victim-of-clop-goanywhere-attacks/', 'https://securityaffairs.com/143640/data-breach/hitachi-energy-data-breach.html', 'https://securityaffairs.com/143707/breaking-news/security-affairs-newsletter-round-411-by-pierluigi-paganini.html', 'https://research.checkpoint.com/2023/20th-march-threat-intelligence-report/', 'https://www.malwarebytes.com/blog/news/2023/03/a-week-in-security-march-13-19', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-saks-fifth-avenue-retailer-says-mock-data-stolen/', 'https://www.bleepingcomputer.com/news/security/city-of-toronto-confirms-data-theft-clop-claims-responsibility/', 'https://www.databreaches.net/more-victims-possibly-identify-in-goanywhere-vulnerability-incident/', 'https://www.schneier.com/blog/archives/2023/03/mass-ransomware-attack.html', 'https://therecord.media/uk-pension-protection-fund-clop-goanywhere-fortra', 'https://twitter.com/securityaffairs/status/1639336758704734209', 'https://securityaffairs.com/143938/breaking-news/city-of-toronto-clop-ransomware.html', 'https://www.bleepingcomputer.com/news/security/procter-and-gamble-confirms-data-theft-via-goanywhere-zero-day/', 'https://www.darkreading.com/attacks-breaches/clop-keeps-racking-up-ransomware-victims-with-goanywhere-flaw-', 'https://twitter.com/cahlberg/status/1639207960693051392', 'https://twitter.com/InfoSecSherpa/status/1639058268252422144', 'https://www.bleepingcomputer.com/news/security/crown-resorts-confirms-ransom-demand-after-goanywhere-breach/', 'https://securityaffairs.com/144193/data-breach/crown-resorts-clop-ransomware.html', 'https://therecord.media/tasmania-government-ransomware-clop-student-documents', 'https://www.malwarebytes.com/blog/threat-intelligence/2023/04/ransomware-review-april-2023']
2,079
Spanish HLA Grupo Hospitalario hit by data breach leaking 45,000 patients' records
Spanish HLA Grupo Hospitalario, a healthcare company, was hit by a cyber attack on or around 14 March 2023, through a misconfigured web server, which allowed an intruder to steal the data of 45,000 patients and 1,600 doctors (including names, phone numbers, email addresses, and internal communications as well as the national and tax identifiacation numbers of affected healthcare professionals). Some of this data was subsequently leaked on 14 March 2023. The health insurance group Asisa, which owns the hospital network, acknowledged on the next day that it was looking into the reported incident.
2023-03-01
2023-03-14
Attack on critical infrastructure target(s)
null
Incident disclosed by attacker
Data theft & Doxing; Hijacking with Misuse
[['HLA Grupo Hospitalario']]
['Spain']
[['EUROPE', 'NATO', 'EU']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Not available']
null
1
2023-03-14 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
null
null
null
null
null
null
null
['https://cronicaglobal.elespanol.com/vida/asisa-alerta-seguridad-hla-grupo-hospitalario_783983_102.html']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
8
No system interference/disruption
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
null
0
Not available
0
euro
Not available
Human rights; Sovereignty
Civic / political rights;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.databreaches.net/bits-n-pieces-trozos-y-piezas-32/', 'https://euroweeklynews.com/2023/03/16/personal-data-of-50000-users-stolen-in-alleged-cyberattack-on-asisa-network-of-hla-grupo-hospitals-in-spain/', 'https://cronicaglobal.elespanol.com/vida/asisa-alerta-seguridad-hla-grupo-hospitalario_783983_102.html', 'https://almeriagold.com/personal-data-of-50000-users-stolen-in-alleged-cyberattack-on-asisa-network-of-hla-grupo-hospitals-in-spain/']
2,080
Russian hacktivist group Phoenix compromised Indian health ministry's health management system in 2023
The Russian hacktivist group Phoenix launched an attack against the Indian Health Ministry's health management information system (HMIS) in 2023, in which the group gained access to HMIS portal and stole hospital, employee, and physician data, the cybersecurity firm CloudSEK reported. The attack occured against the backdrop of a meeting of G20 finance ministers hosted by India in late February, during which several member states sought a condemnation of Russia over its invasion of Ukraine and questions about India's participation in a G7-brokered oil price cap agreement designed to set a price ceiling for Russian oil exports. India's Computer Emergency Response Team has been tasked with investigating the incident.
2023-01-01
2023-01-01
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by attacker
Data theft; Hijacking with Misuse
[['Ministry of Health']]
['India']
[['ASIA', 'SASIA', 'SCO']]
[['State institutions / political system']]
[['Government / ministries']]
['Phoenix']
['Russia']
['Non-state-group']
['Hacktivist(s)']
1
2023-03-15 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
Phoenix
null
Russia
Phoenix
Russia
Non-state-group
Hacktivist(s)
['https://cloudsek.com/threatintelligence/russian-hacktivist-group-phoenix-targets-indias-health-ministry-website']
System / ideology; Territory; Resources; International power
System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection
Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine
Yes / HIIK intensity
HIIK 5
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Low
7
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Civic / political rights; ;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.databreaches.net/website-intrusion-attempt-indias-department-of-health-seeks-help-from-chot-in/', 'https://cloudsek.com/threatintelligence/russian-hacktivist-group-phoenix-targets-indias-health-ministry-website', 'https://pipanews.com/website-intrusion-attempt-department-of-health-seeks-help-from-chot-in-pipa-news/']
2,086
Independent Living Systems targeted in data breach affecting over four million people during June-July 2022
Florida-based Independent Living Systems (ILS), a healthcare services provider, was targeted by unknown actors between 30 June and 5 July 2022, resulting in the theft of potentially sensitive personal data of over 4.2 million individuals, including names, addresses, dates of birth, health insurance information, social security numbers, billing information, and medical records containing details on diagnoses, treatments, prescriptions and other mental and physical health assessments. In its incident notification, ILS does not directly clarify whether the attack involved ransomware but notes the attack rendered certain computer systems inaccessible, a description that could fit a ransomware attack. ILS took action to remedy the impact of the attack and alerted authorities, which confirmed the scope of the breach. The breach was confirmed by ILS in September 2022 and affected customers were notified in March 2023.
2022-06-30
2022-07-05
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft; Hijacking with Misuse
[['Not available'], ['Independent Living Systems (ILS)']]
['United States', 'United States']
[['NATO', 'NORTHAM'], ['NATO', 'NORTHAM']]
[['Critical infrastructure'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']]
[['Health'], ['']]
null
null
null
null
1
null
null
null
null
null
null
null
null
None; Unknown - not attributed
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
6
No system interference/disruption
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Not available
null
Not available
0
null
null
null
null
null
null
null
No response justified (missing state attribution & breach of international law)
null
['https://securityaffairs.com/143832/data-breach/independent-living-systems-data-breach.html', 'https://therecord.media/ils-data-breach-patient-information', 'https://www.cpomagazine.com/cyber-security/massive-data-breach-at-healthcare-provider-ils-compromises-millions-of-patients/', 'https://apps.web.maine.gov/online/aeviewer/ME/40/aacdb720-e082-4ef6-b7e6-f03280b2c4ec.shtml', 'https://www.prnewswire.com/news-releases/independent-living-systems-provides-notice-of-data-event-301771989.html', 'https://www.bleepingcomputer.com/news/security/healthcare-provider-ils-warns-42-million-people-of-data-breach/', 'https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/', 'https://www.govinfosecurity.com/long-term-care-services-firm-says-breach-affects-42-million-a-21448', 'https://securityaffairs.com/144054/breaking-news/security-affairs-newsletter-round-412-by-pierluigi-paganini.html']
2,098
Russia-linked Clop ransomware group disrupted US Wellness computer systems using a Fortra GoAnywhere vulnerability in early 2023
The Russia-linked Clop ransomware group disrupted US Wellness's access to certain of its computer systems using a vulnerability in Fortra's GoAnywhere file transfer solution on 31 January 2023 at the earliest. Healthcare provider US Wellness reported the ransomware attack in a notification letter to the California Attorney General on 22 March 2023. In this notification letter, US Wellness stated that personal information of its customers may have been affected. This includes names, addresses, dates of birth, member ID numbers, where the service originated, and addresses of the service location. This incident is one in a series of reports related to the exploitation of a zero-day vulnerability in Fortra GoAnywhere Managed File Transfer (CVE-2023-0669) by the Clop ransomware group. On 10 February 2023, the Clop Ransomware group claimed to have compromised 130 organisations through the security floaw in an statement to the IT news website Bleeping Computer.
2023-01-31
2023-01-01
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft; Disruption; Hijacking with Misuse
[['US Wellness'], ['Fortra']]
['United States', 'United States']
[['NATO', 'NORTHAM'], ['NATO', 'NORTHAM']]
[['Critical infrastructure'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']]
[['Health'], ['']]
['Clop Ransomware Group']
['Russia']
['Non-state-group']
['Criminal(s)']
2
2023-03-24; 2023-02-10
Media report (e.g., Reuters makes an attribution statement, without naming further sources); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Media-based attribution; Attacker confirms
TechCrunch; Clop
null
United States; United States
Clop Ransomware Group; Clop Ransomware Group
Russia; Not available
Non-state-group; Non-state-group
Criminal(s); Criminal(s)
['https://techcrunch.com/2023/03/24/fortra-goanywhere-clop-ransomware/', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
Yes
One
Exploit Public-Facing Application
Data Exfiltration
null
true
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
5
Moderate - high political importance
5
Low
9
Days (< 7 days)
Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Civic / political rights; ;
Not available
0
null
null
null
null
null
Not available
null
Countermeasures under international law justified (state-atttribution & breach of international law)
null
['https://www.databreaches.net/fortra-told-breached-companies-their-data-was-safe/', 'https://oag.ca.gov/system/files/US%20Wellness%20-%20Adult%20Notification%20Letter%20%28General%29.pdf', 'https://techcrunch.com/2023/03/24/fortra-goanywhere-clop-ransomware/', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/', 'https://twitter.com/lorenzofb/status/1639372433516900353', 'https://twitter.com/zackwhittaker/status/1639372041848512515', 'https://www.malwarebytes.com/blog/threat-intelligence/2023/04/ransomware-review-april-2023']
2,100
Pro-Russian hacker group NoName057(16) disrupted the website of French National Assembly on 26 March 2023
The pro-Russian hacker group NoName057(16) claimed to have disrupted the website of the French National Assembly on 26 March 2023. In the announcement of their actions on Telegram, the hackers purported to side with popular protests against the President Macron's pension reform adopted in the previous week and baselessly compared the French government's assistance to Ukraine with support to neo-Nazis. The group also advanced similar claims for the website of the French Senate, without any immediate evidence of impaired access.
2023-03-26
2023-03-26
Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by attacker
Disruption
[['National Assembly (France)']]
['France']
[['EUROPE', 'NATO', 'EU', 'WESTEU']]
[['State institutions / political system']]
[['Legislative']]
['NoName057(16)']
['Russia']
['Non-state-group']
['Hacktivist(s)']
1
2023-03-27 00:00:00
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms
NoName057(16)
null
Russia
NoName057(16)
Russia
Non-state-group
Hacktivist(s)
['https://t.me/noname05716eng/977', 'https://t.me/noname05716eng/982']
System / ideology; Territory; Resources; International power
System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection
Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine
Yes / HIIK intensity
HIIK 5
0
null
null
null
null
null
No
null
Not available
Network Denial of Service
Not available
true
Not available
Short-term disruption (< 24h; incident scores 1 point in intensity)
Not available
none
none
1
Moderate - high political importance
1
Minor
5
Day (< 24h)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
0
null
0
Not available
0
euro
None/Negligent
Due diligence; Sovereignty
;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.politico.eu/article/french-national-assembly-website-russian-cyberattack-hack-kremlin-emmanuel-macron/?utm_source=RSS_Feed&utm_medium=RSS&utm_campaign=RSS_Syndication', 'https://t.me/noname05716eng/977', 'https://t.me/noname05716eng/982', 'https://twitter.com/MargauxDuguet/status/1640350530009440257?s=20']
2,101
Lockbit ransomware group locked certain computer systems and stole personal information from Washington County Sheriff's Office (WCSO) networks on 21 February 2023
The Lockbit ransomware group locked certain computer systems and stole personal information from the Washington County Sheriff's Office (WCSO) networks on 21 February 2023, Washington County News first reported on the same day. The ransomware group announced the ransomware attack on its website six days later. The ransomware attack locked down computer systems related to finance and jail management. Threats by the ransomware group to publish the stolen personal information revealed these also included home addresses, phone numbers, social security numbers, and other personal information of more than 500 employees. On 21 February, the Washington County sheriff claimed the attackers operated from Russia. On 28 March 2023, eight days after the deadline for the ransom payment, Lockbit released the stolen data, which was said to be warrants and employee information.
2023-02-21
2023-02-21
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by media (without further information on source); Incident disclosed by authorities of victim state
Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware
[["Washington County Sheriff's Office (WCSO)"]]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Police']]
['LockBit']
['Not available']
['Non-state-group']
['Criminal(s)']
2
2023-02-27; 2023-02-21
Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media
Attacker confirms; Attribution by receiver government / state entity
Lockbit; Kevin Crews (Sheriff of Washington County Sheriff's Office, United States)
null
Not available; United States
LockBit; Not available
Not available; Russia
Non-state-group; Unknown - not attributed
Criminal(s);
['https://washingtoncounty.news/2023/02/21/wcso-under-cyber-attack-tuesday/', 'https://www.redpacketsecurity.com/lockbit-3-0-ransomware-victim-wcso-us/', 'https://washingtoncounty.news/2023/03/02/wcso-nearly-recovered-from-cyber-attack/']
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration; Data Encrypted for Impact
Not available
true
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
6
Moderate - high political importance
6
Medium
12
Days (< 7 days)
Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
null
0
euro
None/Negligent
Human rights; Due diligence; Sovereignty
Civic / political rights; ;
Not available
0
null
null
null
null
null
Not available
null
Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law)
null
['https://www.databreaches.net/a-listing-on-a-government-victim-disappeared-from-lockbits-site-but-why/', 'https://www.newsbreak.com/washington-county-fl/2963890438373-hackers-threaten-to-release-washington-county-sheriff-s-office-personal-data', 'https://washingtoncounty.news/2023/02/21/wcso-under-cyber-attack-tuesday/', 'https://washingtoncounty.news/2023/03/02/wcso-nearly-recovered-from-cyber-attack/', 'https://www.redpacketsecurity.com/lockbit-3-0-ransomware-victim-wcso-us/', 'https://therecord.media/florida-sheriff-data-leak-lockbit-ransomware', 'https://www.databreaches.net/data-stolen-from-florida-sheriffs-office-leaked-by-lockbit-ransomware-group/', 'https://www.malwarebytes.com/blog/business/2023/04/top-5-cyberthreats-facing-msps-and-vars-in-2023']
2,102
Unknown actors deployed ransomware against the servers of US telecommunications company Lumen Technologies
Unknown actors deployed ransomware against the servers of US telecommunications company Lumen Technologies, the company detailed in a filing to the Securities and Exchange Commission on 27 March 2023. The ransomware attack degraded hosting services for a small number of the company's customers.
2023-01-01
2023-01-01
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Disruption; Hijacking with Misuse; Ransomware
[['Lumen Technologies']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Telecommunications']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Encrypted for Impact
Not available
true
Not available
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
4
Moderate - high political importance
4
Low
6
Days (< 7 days)
No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html', 'https://d3ka4b6b7wffw2.cloudfront.net/0000018926/100217360736/4ea1c4d3-54b5-48e9-b56e-d4865d7a8948.pdf']
2,103
Sophisticated intruder accessed internal information of US telecommunications company Lumen Technologies
A sophisticated intruder accessed internal information of US telecommunications company Lumen Technologies, the company disclosed on 27 March 2023 as part of investor notification obligations. The company specified that only a relatively limited amount of data was exfiltrated.
2023-01-01
2023-01-01
Attack on critical infrastructure target(s)
null
Incident disclosed by victim
Data theft; Hijacking with Misuse
[['Lumen Technologies']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Telecommunications']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Not available
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
3
Moderate - high political importance
3
Minor
5
No system interference/disruption
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html', 'https://d3ka4b6b7wffw2.cloudfront.net/0000018926/100217360736/4ea1c4d3-54b5-48e9-b56e-d4865d7a8948.pdf']
2,110
In August 2022, the US city of Fremont County is attacked by an unknown threat actor with the BlackCat Ransomware
On 17 August 2022, the US city of Fremont County in Colorado discovered that it had been attacked by an unknown threat actor with the BlackCat Ransomware between 13 and 17 August 2022. In doing so, certain files and folders on the servers could no longer be accessed and the threat actor had unauthorised access to certain files. The Fremont County Sheriff's Office wrote on 19 September 2022 that the cyber incident resulted in the loss of access to several of the city's systems. Inmate accounting systems for the sheriff's office also could not be restored, resulting in the loss of all account information. By November 2022, the city's systems were 90 per cent restored.
2023-08-13
2023-08-17
Attack on (inter alia) political target(s), not politicized
null
Incident disclosed by authorities of victim state
Data theft; Disruption; Hijacking with Misuse; Ransomware
[['Fremont County']]
['United States']
[['NATO', 'NORTHAM']]
[['State institutions / political system']]
[['Civil service / administration']]
null
null
null
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
0
null
null
null
null
null
No
null
Not available
Data Exfiltration
Not available
true
For private / commercial targets: non-sensitive information (incident scores 1 point in intensity)
Long-term disruption (> 24h; incident scores 2 points in intensity)
Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity)
none
none
5
Moderate - high political importance
5
Low
7
Days (< 7 days)
Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data
1-10
0
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
null
null
No response justified (missing state attribution & breach of international law)
null
['https://fremontcountyco.state.co.us/information-updates', 'https://www.denverpost.com/2022/09/22/wheat-ridge-ransomware-fremont-county-cyber-attack/', 'https://www.cbsnews.com/colorado/news/ransomware-attacks-hit-wheat-ridge-fremont-counties-everything-was-impacted/', 'https://www.govtech.com/security/fremont-county-colo-in-recovery-phase-after-cyber-attack', 'https://www.govtech.com/security/fremont-county-colo-nears-full-capacity-after-cyber-attack', 'https://crimewatch.net/us/co/fremont/sheriff/180579/post/notice-regarding-inmate-accounts?fbclid=IwAR1ybBZcU-etZNtpxBt62ogOeDgxVp5lJP7Iu5Cw4XS0-5zX7RaNZSRZGkk']
2,111
In October 2022, a subcontractor of Centers for Medicare and Medicaid Services in US becomes the target of a ransomware attack
On 14 December 2022, Centers for Medicare and Medicaid Services (CMS) announced that its subcontractor Healthcare Management Solutions (HMS) was the target of a ransomware attack on 8 October 2022. In the process, CMS reported that following an investigation on 18 October, it believed with a high degree of confidence that personal information and protected health information of up to 254,000 Medicare beneficiaries had been compromised, including sensitive banking information. House Committee on Oversight and Accountability Chair James Comer and House Committee on Energy and Commerce Chair Cathy McMorris Rodgers requested documents and communications from CMS Administrator Chiquita Brooks-LaSure in a letter on 20 March 2023, as details were reported only with a two-month delay. Congress was not informed until 1 December 2022, according to Comer and Rodgers, although it is required to be notified within seven days of the discovery of a major cyber incident.
2022-10-08
2022-10-08
Attack on non-political target(s), politicized
null
Incident disclosed by victim
Data theft
[['Healthcare Management Solutions (HMS)']]
['United States']
[['NATO', 'NORTHAM']]
[['Critical infrastructure']]
[['Health']]
['Not available']
['Not available']
['Not available']
null
1
null
null
null
null
null
null
null
null
null
null
[]
Unknown
Not available
null
Not available
null
1
2023-03-20 00:00:00
State Actors: Legislative reactions
Legislative initiative
United States
James Comer (House Committee on Oversight and Accountability Chairman)
No
null
Not available
Data Exfiltration
Not available
false
For private / commercial targets: sensitive information (incident scores 2 points in intensity)
Not available
Not available
none
none
2
Moderate - high political importance
2
Low
6
No system interference/disruption
Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data
1-10
1
1-10
1
Not available
0
euro
Not available
Not available
null
Not available
0
null
null
null
null
null
Not available
null
No response justified (missing state attribution & breach of international law)
null
['https://www.databreaches.net/warning-to-seniors-personal-data-of-254k-medicare-beneficiaries-at-risk-after-breach/', 'https://www.cms.gov/newsroom/press-releases/cms-responding-data-breach-subcontractor', 'https://fedscoop.com/cms-subcontractor-data-breach/', 'https://fedscoop.com/cms-subcontractor-breach-timeline/', 'https://d1dth6e84htgma.cloudfront.net/CMS_Data_Breach_Letter_FINAL_f1fb700429.pdf?updated_at=2023-03-20T15:21:59.023Z']