ID
int64 2
2.11k
| name
stringlengths 4
279
| description
stringlengths 19
3.75k
| start_date
stringlengths 10
10
⌀ | end_date
stringlengths 10
10
⌀ | inclusion_criteria
stringclasses 22
values | inclusion_criteria_subcode
stringclasses 2
values | source_incident_detection_disclosure
stringclasses 26
values | incident_type
stringclasses 23
values | receiver_name
stringclasses 172
values | receiver_country
stringlengths 8
438
⌀ | receiver_region
stringlengths 8
1.24k
⌀ | receiver_category
stringlengths 11
3.52k
⌀ | receiver_category_subcode
stringlengths 11
1.32k
⌀ | initiator_name
stringlengths 7
480
⌀ | initiator_country
stringclasses 131
values | initiator_category
stringclasses 25
values | initiator_category_subcode
stringclasses 23
values | number_of_attributions
int64 0
10
| attribution_date
stringclasses 232
values | attribution_type
stringclasses 127
values | attribution_basis
stringclasses 101
values | attributing_actor
stringclasses 135
values | attribution_it_company
stringclasses 7
values | attributing_country
stringclasses 79
values | attributed_initiator
stringlengths 3
7.87k
⌀ | attributed_initiator_country
stringclasses 195
values | attributed_initiator_category
stringclasses 75
values | attributed_initiator_subcategory
stringclasses 50
values | sources_attribution
stringlengths 2
1.25k
| cyber_conflict_issue
stringclasses 56
values | offline_conflict_issue
stringclasses 62
values | offline_conflict_name_HIIK
stringclasses 21
values | offline_conflict_intensity
stringclasses 3
values | offline_conflict_intensity_subcode
stringclasses 5
values | number_of_political_responses
int64 0
7
| political_response_date
stringclasses 41
values | political_response_type
stringclasses 20
values | political_response_type_subcode
stringclasses 23
values | political_response_country
stringclasses 31
values | political_response_actor
stringclasses 41
values | zero_days
stringclasses 4
values | zero_days_subcode
stringclasses 2
values | MITRE_initial_access
stringclasses 20
values | MITRE_impact
stringclasses 28
values | user_interaction
stringclasses 2
values | has_disruption
bool 2
classes | data_theft
stringclasses 4
values | disruption
stringclasses 4
values | hijacking
stringclasses 4
values | physical_effects_spatial
stringclasses 4
values | physical_effects_temporal
stringclasses 4
values | unweighted_cyber_intensity
int64 0
7
| target_multiplier
stringclasses 3
values | weighted_cyber_intensity
float64 0
10
⌀ | impact_indicator
stringclasses 4
values | impact_indicator_value
float64 0
13
⌀ | functional_impact
stringclasses 6
values | intelligence_impact
stringclasses 6
values | political_impact_affected_entities
stringclasses 5
values | political_impact_affected_entities_exact_value
float64 0
150
⌀ | political_impact_third_countries
stringclasses 4
values | political_impact_third_countries_exact_value
float64 0
6
⌀ | economic_impact
stringclasses 2
values | economic_impact_exact_value
float64 0
100M
⌀ | economic_impact_currency
stringclasses 2
values | state_responsibility_indicator
stringclasses 4
values | IL_breach_indicator
stringclasses 32
values | IL_breach_indicator_subcode
stringclasses 21
values | evidence_for_sanctions_indicator
stringclasses 3
values | number_of_legal_responses
int64 0
3
| legal_response_date
stringclasses 18
values | legal_response_type
stringclasses 8
values | legal_response_type_subcode
stringclasses 4
values | legal_response_country
stringclasses 15
values | legal_response_actor
stringclasses 20
values | legal_attribution_reference
stringclasses 11
values | legal_attribution_reference_subcode
stringclasses 5
values | legal_response_indicator
stringclasses 4
values | casualties
float64 | sources_url
stringlengths 2
9.44k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1,916 | US care manager organization Minuteman Senior Services was breached by unknown actors in 2022 | The non-profit organization Minuteman Senior Services (MSS), based in Massachusetts, notified the US Department of Health and Human Services that it was hit by a data breach, affecting more than 500 patients. The organization detected the intrusion on 20 November 2022 and alerted authorities on 27 January 2023. Based on an initial assessment, compromised data included patients' full name, address, date of birth, gender, health insurance information, diagnoses, and service utilization. | 2022-11-21 | 2022-11-30 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft; Hijacking with Misuse | [['Minuteman Senior Services (MSS)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 6 | No system interference/disruption | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Human rights; Sovereignty | Civic / political rights; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.databreaches.net/second-verse-same-as-the-first-minuteman-senior-services-reports-another-breach-of-an-employee-email-account/', 'https://www.minutemansenior.org/about-us/notice-of-november-data-event'] |
1,925 | Anonymous Sudan disrupted the website of Scandinavian Airlines (SAS) and leaked customer information on 14 February 2023 | Scandinavian Airlines (SAS) was hacked and its website taken offline by a group referring to itself as Anonymous Sudan. Customers attempting to log in into the airline's app were redirected and shown information from accounts of other passengers. The incident follows a Quran buring by a far-right politician near the Turkish embassy in Stockholm during a protest in January that was funded by a former contributor to the Russian state-funded outlet RT. Anonymous Sudan has since claimed to have conducted a series of denial-of-service attacks against a variety of organizations in Sweden, citing retaliation for the book burning as its motivation. Targets have included the websites of Swedish airports, banks, railways, airlines, media, telecommunication providers, and organizations in the country's health and education sectors. These alleged attempts do not appear to have caused any significant downtime.
Anonymous Sudan also took responsibility for knocking Sweden's national broadcaster SVT offline on 14 February, around the same time as the attack against SAS.
Marcus Murray, founder of the Swedish cybersecurity firm Trusec, cautioned Anonymous Sudan may be a front for Russian operators, noting that the Quran burning may be an opportunity for Moscow to instigate tension between Sweden and Turkey to hobble Sweden's bid to join NATO. At least one pro-Russian hacker group, UserSec, had promised Anonymous Sudan support on Telegram.
The IT security company Trustwave published a report on 30 March 2023 and concluded that Anonymous Sudan is very possibly a subgroup of the Russian hacktivist group Killnet. | 2023-02-14 | 2023-02-14 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on critical infrastructure target(s) | null | Incident disclosed by attacker | Disruption; Hijacking with Misuse | [['Scandinavian Airlines']] | ['Sweden'] | [['EUROPE', 'EU', 'NORTHEU']] | [['Critical infrastructure']] | [['Transportation']] | ['Anonymous Sudan'] | ['Sudan'] | ['Non-state-group'] | ['Hacktivist(s)'] | 2 | 2023-02-14; 2023-03-30 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Technical report (e.g., by IT-companies, Citizen Lab, EFF) | Attacker confirms; IT-security community attributes attacker | Anonymous Sudan; Trustwave | null | Sudan; United States | Anonymous Sudan; Anonymous Sudan < Killnet | Sudan; Not available | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | ['https://t.me/AnonymousSudan/113', 'https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/anonymous-sudan-religious-hacktivists-or-russian-front-group/'] | System / ideology | System/ideology | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Network Denial of Service | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Low | 6 | Day (< 24h) | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | 1-10 | 1 | null | 0 | Not available | 0 | euro | None/Negligent | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://therecord.media/scandinavian-airlines-cyberattack-anonymous-sudan/', 'https://www.darkreading.com/attacks-breaches/pro-islam-anonymous-sudan-hacktivists-front-russia-killnet-operation', 'https://t.me/AnonymousSudan/113', 'https://www.databreaches.net/airline-sas-network-hit-by-hackers-says-app-was-compromised/', 'https://www.sasgroup.net/newsroom/press-releases/2023/sas-cyber-attack--update/', 'https://t.me/user_sec/151', 'https://www.svt.se/nyheter/inrikes/en-rad-it-attacker-mot-sverige-har-ar-kontot-som-tar-pa-sig-ansvaret', 'https://www.bleepingcomputer.com/news/security/scandinavian-airlines-says-cyberattack-caused-passenger-data-leak/', 'https://www.hackread.com/sas-airlines-hit-by-cyber-attack/', 'https://twitter.com/Dinosn/status/1626457027978338305', 'https://research.checkpoint.com/2023/20th-february-threat-intelligence-report/', 'https://twitter.com/lukOlejnik/status/1627551573348843520', 'https://twitter.com/cybersecboardrm/status/1625792913937428482', 'https://twitter.com/InfoSecSherpa/status/1625708981141311488', 'https://twitter.com/CERTEU/status/1631572192667353089', 'https://socradar.io/hacktivism-on-the-rise-killnet-anonymous-sudans-cyber-campaign-targets-australia/', 'https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/anonymous-sudan-religious-hacktivists-or-russian-front-group/', 'https://research.checkpoint.com/2023/3rd-april-threat-intelligence-report/', 'https://www.techrepublic.com/article/ddos-attack-israel/'] |
1,928 | Moroccan Press Agency hit by DDoS attack | The websites of the Moroccan Press Agency (MAP) were hit by a DDoS attack from unknown actors on 16 February 2023. | 2023-02-16 | 2023-02-16 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Disruption | [['Agence Marocaine de Presse (MAP)']] | ['Morocco'] | [['AFRICA', 'NAF', 'MENA']] | [['Media']] | null | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | 2023-02-16 00:00:00 | Media report (e.g., Reuters makes an attribution statement, without naming further sources) | Media-based attribution | Agence Marocaine de Presse (MAP) | null | Morocco | null | null | null | null | [] | System / ideology | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | Not available | Network Denial of Service | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Not available | none | none | 1 | Moderate - high political importance | 1 | Minor | 5 | Day (< 24h) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | [] |
1,929 | Unknown actor(s) infiltrated the FBI New York Field Office in February 2023 | Unknown actor(s) hacked into the FBI's field office in New York in February 2023, attacking a system used to investigate child exploitation. | null | 2023-02-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by authorities of victim state | Hijacking without Misuse | [['Federal Bureau of Investigation (FBI; United States)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Police']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Not available | Not available | false | Not available | Not available | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | Minor | 1 | Not available | Not available | 1-10 | 1 | Not available | 0 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://tarnkappe.info/artikel/it-sicherheit/fbi-gehackt-angriff-auf-aussenstelle-in-new-york-265594.html', 'https://www.wired.com/story/godaddy-hacked-3-years/', 'https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/', 'https://therecord.media/us-marshals-service-becomes-latest-law-enforcement-agency-hit-by-hackers/', 'https://www.hackread.com/us-marshals-service-ransomware-attack/', 'https://edition.cnn.com/2023/02/17/politics/fbi-cyber-incident-computer-network/index.html', 'https://www.hackread.com/fbi-hack-network-breach/', 'https://www.bleepingcomputer.com/news/security/fbi-is-investigating-a-cybersecurity-incident-on-its-network/', 'https://twitter.com/snlyngaas/status/1626556725942796288', 'https://cyberscoop.com/fbi-new-york-cyberattack/', 'https://www.databreaches.net/fbi-says-it-has-contained-cyber-incident-on-bureaus-computer-network/', 'https://twitter.com/Cyber_O51NT/status/1626834335704969216', 'https://twitter.com/Dennis_Kipker/status/1626973390224384002', 'https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/'] |
1,972 | In February 2022, Azerbaijani political activist Abulfaz Gurbanli becomes the victim of a phishing attack | On 15 February 2022, Azerbaijan Internet Watch reported that the political activist Abulfaz Gurbanli lost access to his Gmail and Facebook account through a phishing email after deleting and resetting his device, and could not access it again until 17 February. A few months earlier, a report was released on the dissemination of the Pegasus spy software and listed numbers of activists, including Gurbanli, whose devices had been infected. This caused Gurbanli to reset his device. On 15 February, he was asked for an interview by an alleged journalist from the BBC Azerbaijan Service, who sent him an email with an infected attachment that, when opened, downloaded malware. Through the backdoor which was installed in the context, the hacker was able to access Gurbanli's accounts and delete the content of at least seven community sites where the activist was an administrator. The attack came shortly after the publication of an article by a pro-government media outlet that accused Gurbanli of organising colour revolutions in Azerbaijan. Based on that, this incident is assigned to the domestic conflict between Azerbaijan and the opposition, even though no attribution has been published. | 2022-02-15 | 2022-02-17 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by third-party-actor (e.g., Citizen Lab, Amnesty International, whistleblowers) or authorities of another state | Disruption; Hijacking with Misuse | [['Abulfaz Gurbanli']] | ['Azerbaijan'] | [['ASIA', 'CENTAS']] | [['Social groups']] | [['Advocacy / activists (e.g. human rights organizations)']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | System / ideology; National power | System/ideology; National power | Azerbaijan (opposition); Azerbaijan (opposition) | Yes / HIIK intensity | HIIK 3 | 0 | null | null | null | null | null | No | null | Phishing | Account Access Removal | Required | true | Not available | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 8 | Days (< 7 days) | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Human rights | Civic / political rights | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.az-netwatch.org/news/deliberate-targeting-in-pro-government-media-leads-to-targeted-attacks-online-the-case-of-abulfaz-gurbanli/', 'https://www.qurium.org/alerts/azerbaijan/yet-another-targeted-malware-against-azerbajani-political-activists/'] |
1,975 | Unknown actors exfiltrated data and deployed ransomware against US Marshals Service (USMS) computer systems on 17 February 2023 | Unknown actors exfiltrated data and deployed ransomware against US Marshals Service (USMS) computer systems on 17 February 2023.
USMS spokesperson Drew Wade announced that the affected system contained sensitive law enforcement information, such as returns from legal process, administrative information, and personally identifiable information (PII) pertaining to subjects of USMS investigations, third parties and certain USMS employees.
A senior law enforcement official confirmed to NBC News, which first reported the incident, that the Witness Security Programme database was not affected. | 2023-02-17 | 2023-02-17 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source); Incident disclosed by authorities of victim state | Data theft; Disruption; Hijacking with Misuse; Ransomware | [['U.S. Marshals Service (USMS)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Police']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration; Data Encrypted for Impact | Not available | true | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 6 | Moderate - high political importance | 6 | Low | 9 | Day (< 24h) | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Human rights; Sovereignty | Civic / political rights; | Not available | 1 | 2023-02-17 00:00:00 | Other legal measures on national level (e.g. law enforcement investigations, arrests) | null | United States | US Justice Department | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.darkreading.com/threat-intelligence/us-marshals-ransomware-hit-major-incident', 'https://www.nbcnews.com/politics/politics-news/major-us-marshals-service-hack-compromises-sensitive-info-rcna72581', 'https://twitter.com/CyberScoopNews/status/1630610533715001364', 'https://twitter.com/securityaffairs/status/1630591974490210304', 'https://securityaffairs.com/142823/cyber-crime/u-s-marshals-service-suffers-a-ransomware-attack.html', 'https://twitter.com/lorenzofb/status/1630585945476018178', 'https://twitter.com/Dinosn/status/1630470251400818688', 'https://twitter.com/securityaffairs/status/1630701555967045640', 'https://twitter.com/RecordedFuture/status/1630681565247176708', 'https://therecord.media/us-marshals-service-becomes-latest-law-enforcement-agency-hit-by-hackers/', 'https://twitter.com/ImposeCost/status/1630397385456197634', 'https://twitter.com/snlyngaas/status/1630395432143581185', 'https://twitter.com/aselawaid/status/1630369754262192130', 'https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/', 'https://twitter.com/ericgeller/status/1630363090201059329', 'https://www.hackread.com/us-marshals-service-ransomware-attack/', 'https://twitter.com/DigitalPeaceNow/status/1630705797964390401', 'https://twitter.com/DigitalPeaceNow/status/1630705797964390401', 'https://twitter.com/Malwarebytes/status/1630740638391050240', 'https://twitter.com/DarkReading/status/1630948918799265792', 'https://twitter.com/campuscodi/status/1630848522584047617', 'https://twitter.com/securityaffairs/status/1631246209611358211', 'https://twitter.com/SentinelOne/status/1631263226913603584', 'https://www.wired.com/story/lastpass-engineer-breach-security-roundup/', 'https://www.cybereason.com/blog/variant-payload-prevention-fuzzy-similarity', 'https://www.malwarebytes.com/blog/news/2023/03/a-week-in-security-feb-27-mar-5', 'https://www.malwarebytes.com/blog/threat-intelligence/2023/03/ransomware-review-march-2023', 'https://www.bleepingcomputer.com/news/security/hacker-selling-data-allegedly-stolen-in-us-marshals-service-hack/', 'https://research.checkpoint.com/2023/20th-march-threat-intelligence-report/', 'https://therecord.media/camden-county-police-ransomware-new-jersey-philadelphia', 'https://www.nbcnewyork.com/news/local/ransomware-attack-at-nj-county-police-department-locks-up-criminal-investigative-files/4219341/'] |
2,020 | Ransom House Group conducted a ransomware attack against the Hospital Clínic in Barcelona on 5 March 2023 | According to the Catalan Cybersecurity Agency, the ransomware group called Ransom House perpetrated a ransomware attack against the Hospital Clínic in Barcelona, Spain on 5 March 2023.
General secretary of the hospital chapter of the Spanish labour union CC OO, Àlex Duque, stated that many processes had to be switched over to manual or paper-based procedures. The attack affected operations at the hospital's laboratory and pharmacy. The hospital temporarily redirected ambulances and canceled thousand non-emergency surgeries and radiotherapy appointments. Also mentioned in the government's statement is that the cyber attack affected the emergency services of three medical centres linked to the Clínic de Barcelona, namely CAP Casanova, CAP Borrell and CAP Les Corts. Just under three weeks after the attack, the clinic acknowledged that the confidentiality of patient and employee data could be at risk. | 2023-03-02 | 2023-03-05 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Disruption; Hijacking with Misuse; Ransomware | [['Hospital Clinic de Barcelona']] | ['Spain'] | [['EUROPE', 'NATO', 'EU']] | [['Critical infrastructure']] | [['Health']] | ['Ransom House'] | ['Not available'] | ['Not available'] | null | 1 | 2022-03-06 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by receiver government / state entity | Cybersecurity Agency of Catalonia | null | Spain | Ransom House | null | null | null | ['https://apnews.com/article/barcelona-hospital-cyberattack-ransomware-37e0fee33798c56459e63866ca8b449f'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Encrypted for Impact | Not available | true | Not available | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Very high political importance (e.g., critical infrastructure, military) - intensity multiplied by 1.5 | 6 | Low | 6 | Days (< 7 days) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | null | 0 | Not available | 0 | euro | Not available | Human rights; Sovereignty | Civic / political rights; | Not available | 1 | 2023-03-01 00:00:00 | Other legal measures on national level (e.g. law enforcement investigations, arrests) | null | Spain | Mossos d'Esquadra (ESP) | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-05/el-hospital-clinic-de-barcelona-victima-de-un-ciberataque-que-afecta-a-las-urgencias-el-laboratorio-y-la-farmacia.html', 'https://govern.cat/salapremsa/notes-premsa/488242/comunicat', 'https://twitter.com/securityaffairs/status/1632878280985440257', 'https://securityaffairs.com/143121/cyber-crime/hospital-clinic-de-barcelona-ransomware.html', 'https://twitter.com/cybersecboardrm/status/1632839634026635264', 'https://twitter.com/ransomwaremap/status/1632822747343486977', 'https://twitter.com/DigitalPeaceNow/status/1632761704479088641', 'https://therecord.media/barcelona-hospital-ransomware-spain', 'https://apnews.com/article/barcelona-hospital-cyberattack-ransomware-37e0fee33798c56459e63866ca8b449f', 'https://www.databreaches.net/es-cyberattack-at-lhospital-clinic-has-affected-laboratory-pharmacy-and-emergency-services/', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-05/el-hospital-clinic-de-barcelona-victima-de-un-ciberataque-que-afecta-a-las-urgencias-el-laboratorio-y-la-farmacia.html', 'https://twitter.com/Dinosn/status/1632969620226277379', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-07/el-hospital-clinic-de-barcelona-48-horas-despues-del-ciberataque-hacemos-las-pruebas-y-lo-escribimos-en-papel.html', 'https://twitter.com/securityaffairs/status/1633210345396346888', 'https://www.bleepingcomputer.com/news/security/hospital-cl-nic-de-barcelona-severely-impacted-by-ransomware-attack/', 'https://twitter.com/dani_stoffers/status/1633056771051749376', 'https://twitter.com/securityaffairs/status/1633030644539195393', 'https://twitter.com/cahlberg/status/1632993055820197890', 'https://twitter.com/secIT_DE/status/1633177845391577089', 'https://twitter.com/securityaffairs/status/1632878280985440257', 'https://twitter.com/cybersecboardrm/status/1632839634026635264', 'https://twitter.com/ransomwaremap/status/1632822747343486977', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2023-police-take-action/', 'https://elpais.com/https:/elpais.com/tecnologia/2023-03-12/el-ciberataque-al-hospital-clinic-de-barcelona-desde-dentro-ha-sido-como-hacer-un-viaje-en-el-tiempo.html', 'https://securityaffairs.com/143398/breaking-news/security-affairs-newsletter-round-410-by-pierluigi-paganini.html', 'https://twitter.com/douglittlejr/status/1633467375050735616', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-03-21/el-hospital-clinic-reconoce-ahora-que-el-ciberataque-podria-comprometer-la-confidencialidad-de-los-datos-de-pacientes-y-trabajadores.html', 'https://twitter.com/AlexMartin/status/1639241047816511501', 'https://www.databreaches.net/es-clinic-hackers-threaten-to-destroy-information-about-patients-with-infectious-diseases/', 'https://elpais.com/https:/elpais.com/espana/catalunya/2023-04-08/ciberataque-en-el-clinic-por-que-el-hospital-no-estaba-integrado-en-la-agencia-de-ciberseguridad-si-existia-un-plan-para-ello.html'] |
2,035 | Pro-Russian hacker group NoName057(16) disrupted the websites of an Italian company and state institutions on 6 March 2023 | The pro-Russian hacker group NoName057(16) disrupted the websites of an Italian company and state institutions on 6 March 2023, as disclosed by the hackers themselves.
The affected targets include the Italian telecommunications company TIM, the Carabinieri, the Ministry of Labour and the High Council of the Judiciary.
The group managed to cause short downtimes of a few minutes and delays for access to some of the sites. The High Council of the Judiciary had announced increased DDoS protections following an earlier wave of disruption attempts on 21 February that had knocked its website offline for several hours. | 2023-03-06 | 2023-03-06 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized; Attack on critical infrastructure target(s) | null | Incident disclosed by attacker | Disruption | [['High Council of the Judiciary'], ['TIM'], ['Ministry of Labour and Social Policies (Italy)'], ['Carabinieri']] | ['Italy', 'Italy', 'Italy', 'Italy'] | [['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU']] | [['State institutions / political system'], ['Critical infrastructure'], ['State institutions / political system'], ['State institutions / political system']] | [['Judiciary'], ['Telecommunications'], ['Government / ministries'], ['Military']] | ['NoName057(16)'] | ['Russia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | 2023-03-06 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | NoName057(16) | null | Russia | NoName057(16) | Russia | Non-state-group | Hacktivist(s) | ['https://t.me/noname05716/2195', 'https://t.me/noname05716/2196', 'https://t.me/noname05716/2197', 'https://t.me/noname05716/2198'] | System / ideology; Territory; Resources; International power | System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection | Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | Not available | Network Denial of Service | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Not available | none | none | 1 | Moderate - high political importance | 1 | Minor | 5 | Day (< 24h) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 4 | null | 0 | Not available | 0 | euro | None/Negligent | Due diligence; Sovereignty | ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.ilsole24ore.com/art/gli-hacker-filorussi-noname057-hanno-attaccato-la-seconda-volta-l-italia-AEZ8HxyC', 'https://t.me/noname05716/2195', 'https://t.me/noname05716/2196', 'https://t.me/noname05716/2197', 'https://t.me/noname05716/2198', 'https://socradar.io/dark-web-profile-noname05716/'] |
2,036 | Unknown actors gained access to vulnerable routers used by a municipal government and medium-sized businesses using HiatusRAT since at least June 2022 | Unknown actors gained access to vulnerable routers used by a municipal government and medium-sized businesses using HiatusRAT since at least June 2022, according to technical reports by Black Lotus Labs.
The affected businesses are consulting firms, IT service providers, and pharmaceutical companies from Latin America, Europe, and North America. Out of more than 4,100 exposed connected routers, at least 100 showed signs of compromise with the possibility of data exfiltration.
The vulnerable routers are DrayTek Vigor models 2960 and 3900.
In addition to the opportunistic collection of data, the infiltrations were designed to faciliate the creation of a proxy network to stage further attacks. | 2022-06-01 | null | Attack on (inter alia) political target(s), not politicized; Attack on critical infrastructure target(s) | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | [['Not available'], ['Not available'], ['Not available']] | ['South America', 'North America', 'North America'] | null | [['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['State institutions / political system', 'Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Civil service / administration', 'Health', ''], ['Civil service / administration', 'Health', ''], ['Civil service / administration', 'Health', '']] | null | null | null | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 3 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | Not available | 0 | Not available | 0 | Not available | 0 | euro | Not available | Cyber espionage; Sovereignty | ; | Not available | 0 | null | null | null | null | null | null | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://twitter.com/UK_Daniel_Card/status/1632759937741750273', 'https://twitter.com/Cyber_O51NT/status/1632758899156856833', 'https://www.bleepingcomputer.com/news/security/new-malware-infects-business-routers-for-data-theft-surveillance/', 'https://thehackernews.com/2023/03/new-hiatusrat-malware-targets-business.html', 'http://news.lumen.com/2023-03-06-Black-Lotus-Labs-uncovers-another-new-malware-that-targets-compromised-routers', 'https://blog.lumen.com/new-hiatusrat-router-malware-covertly-spies-on-victims/', 'https://www.darkreading.com/threat-intelligence/hiatusrat-campaign-draytek-gear-cyber-espionage-proxy-control', 'https://twitter.com/Dinosn/status/1632969801759961088', 'https://twitter.com/cybersecboardrm/status/1633195187467063297', 'https://www.techrepublic.com/article/hiatus-malware-campaign-targets-routers/'] |
2,038 | Chinese state-sponsored hacking group Sharp Panda gained access to the networks of a Southeast Asian government using the Soul backdoor beginning in late 2022 | Sharp Panda, a Chinese state-sponsored hacking group, gained access to the networks of a Southeast Asian government using the Soul backdoor beginning in late 2022, according to a technical report by Israeli IT security company Check Point Research.
Early stages of the attack, Check Point found, correspond with activity against Southeast Asian governments identified as Sharp Panda and tied to China with medium to high confidence in 2021; CheckPoint researchers attributed this attack to Sharp Panda in 2022. Some of the organizations targeted with the previously unattributed Soul Framework also showed signs of compromise with APT10 and APT30 tools during the same timeframe. Considering tool sharing practices among Chinese groups, Check Point continues to track Sharp Panda as a separate cluster and suspects the actors behind the Soul Framework to be a Chinese-backed or possibly nation-state group. | 2022-01-01 | null | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | [['Not available']] | ['Southeast Asia (region)'] | null | [['State institutions / political system']] | [['Government / ministries']] | ['Sharp Panda'] | ['China'] | ['Non-state actor, state-affiliation suggested'] | null | 1 | 2023-03-07 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | Check Point Research | null | Israel | Sharp Panda | China | Non-state actor, state-affiliation suggested | null | ['https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/'] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | Phishing | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 5 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Indirect (knowingly sanctioning / ordering / ideological / material support by official members of state entities/agencies/units for officially non-state-actors) | Cyber espionage; Sovereignty | ; | Not available | 0 | null | null | null | null | null | Not available | null | Countermeasures under international law justified (state-atttribution & breach of international law) | null | ['https://twitter.com/Cyber_O51NT/status/1633125321821286401', 'https://www.bleepingcomputer.com/news/security/new-malware-variant-has-radio-silence-mode-to-evade-detection/', 'https://www.hackread.com/sharp-panda-china-soulsearcher-malware/', 'https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/', 'https://twitter.com/780thC/status/1633077714352582657', 'https://twitter.com/Dinosn/status/1633070796636667906', 'https://thehackernews.com/2023/03/sharp-panda-using-new-soul-framework.html', 'https://securityaffairs.com/143187/apt/sharp-panda-targets-southeast-asia.html', 'https://twitter.com/securityaffairs/status/1633970924461465601', 'https://twitter.com/securityaffairs/status/1634310696409104385', 'https://securityaffairs.com/143398/breaking-news/security-affairs-newsletter-round-410-by-pierluigi-paganini.html'] |
2,039 | Info stealer "SYS01 stealer" targeted critical government infrastructure employees via Facebook Business Accounts since November 2022 | According to IT vendor Morphisec, the info stealer dubbed "SYS01 stealer" targeted critical government infrastructure employees via their Facebook Business Accounts since November 2022. This campaign was first detected in May 2022 but initially attributed to the Ducktailer Operation by ZScaler. The attackers successfully evaded discovery over a period of five months (November 2022 - March 2023). | 2022-11-01 | null | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | [['Not available']] | ['Not available'] | null | [['State institutions / political system', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Government / ministries', '']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Phishing | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 3 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | Not available | 0 | Not available | 0 | Not available | 0 | euro | Not available | Cyber espionage | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://twitter.com/securityaffairs/status/1633235970995761153', 'https://securityaffairs.com/143162/cyber-crime/sys01-stealer-targets-critical-infrastructure.html', 'https://thehackernews.com/2023/03/sys01stealer-new-threat-using-facebook.html', 'https://blog.morphisec.com/sys01stealer-facebook-info-stealer', 'https://twitter.com/securityaffairs/status/1633606917569347584', 'https://www.hackread.com/fake-facebook-profiles-google-ads-sys01-stealer/', 'https://twitter.com/securityaffairs/status/1633971358760681473', 'https://securityaffairs.com/143398/breaking-news/security-affairs-newsletter-round-410-by-pierluigi-paganini.html', 'https://www.techrepublic.com/article/sys01-stealer-targets-facebook-business-accounts-chromium-credentials/'] |
2,040 | Pakistani state-sponsored hacking group Transparent Tribe gained access to the Android mobile phones of 150 targeted people and stole information using the CapraRAT backdoor beginning in July 2022 | The Pakistani hacking group Transparent Tribe, also known as APT36, gained access to the Android mobile phones of 150 targeted people and stole information using the CapraRAT backdoor beginning in July 2022, according to Slovakian IT security company ESET.
The victims are mainly Pakistani and Indian individuals with political and military connections. Further unspecified individuals, affected by the campaign, are based in Russia, Oman, and Egypt.
The hacker group used a romance scam to get their targets to install the trojanized messaging apps MeetsApp and MeetUp and then spy on their targets. | 2022-07-01 | null | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated ; | Incident disclosed by IT-security company | Data theft; Hijacking without Misuse | [['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available']] | ['Egypt', 'Oman', 'Russia', 'Pakistan', 'India'] | [['MENA', 'MEA', 'AFRICA', 'NAF'], ['ASIA', 'MENA', 'MEA', 'GULFC'], ['EUROPE', 'EASTEU', 'CSTO', 'SCO'], ['ASIA', 'SASIA', 'SCO'], ['ASIA', 'SASIA', 'SCO']] | [['Unknown'], ['Unknown'], ['Unknown'], ['Unknown', 'State institutions / political system'], ['Unknown', 'State institutions / political system']] | [[''], [''], [''], ['', 'Military'], ['', 'Military']] | ['APT36/Transparent Tribe/Mythic Leopard/C-Major'] | ['Pakistan'] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 1 | 2023-03-07 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | ESET | null | Slovakia | APT36/Transparent Tribe/Mythic Leopard/C-Major | Pakistan | Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case) | ['https://twitter.com/ESETresearch/status/1633132257228517376', 'https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | Phishing; Trusted Relationship | Not available | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Low | 7 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | 51-200 | 150 | 1-10 | 5 | Not available | 0 | euro | Indirect (knowingly sanctioning / ordering / ideological / material support by official members of state entities/agencies/units for officially non-state-actors) | Cyber espionage; Human rights; Sovereignty | Non-state actors; Civic / political rights; | Not available | 0 | null | null | null | null | null | Not available | null | Countermeasures under international law justified (state-atttribution & breach of international law) | null | ['https://twitter.com/ESETresearch/status/1633132257228517376', 'https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/', 'https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/', 'https://thehackernews.com/2023/03/transparent-tribe-hackers-distribute.html', 'https://twitter.com/IT_SecGuru/status/1633120375985823745', 'https://www.govinfosecurity.com/transparent-tribe-spread-caprarat-via-fake-messaging-apps-a-21398', 'https://securitymea.com/2023/03/09/eset-reveals-cyberespionage-honey-trap-campaign-target-officials-in-india-pakistan-and-middle-east/', 'https://www.welivesecurity.com/videos/apt-hackers-honeytrap-ensnare-targets-week-security-tony-anscombe/'] |
2,041 | Qilin ransomware group targeted elderly care facility in the Netherlands on 17 February 2022 | The Qilin ransomware group targeted Attent Zorg en Behandeling, an elderly care facility in the Netherlands, on 17 February 2022, the affected organization announced on its website. The attacker stole passport information of physicians, nurses, and physiotherapists and later published them online. According to the facility, a significant portion of the affected systems were restored within three days after the attack, allowing it to resume its telephone service and regain access to systems managing client dossiers, finances, and personnel. | 2022-02-17 | 2022-02-17 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware | [['Attent Zorg en Behandeling']] | ['Netherlands'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['Critical infrastructure']] | [['Health']] | ['Qilin Ransomware Group'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | 2023-03-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | Qilin Ransomware Group | null | null | Qilin Ransomware Group | null | Non-state-group | Criminal(s) | ['https://www.security.nl/posting/788375/Ransomwaregroep+publiceert+paspoorten+artsen+Gelderse+oudereninstelling'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Exploit Public-Facing Application | Data Exfiltration; Data Encrypted for Impact | Not available | true | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 6 | Moderate - high political importance | 6 | Low | 10 | Days (< 7 days) | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | null | 0 | Not available | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Civic / political rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://twitter.com/Cyberwarzonecom/status/1633201133819666435', 'https://cyberwarzone.com/qilin-ransomware-attack-elderly-care-facility-breached-and-confidential-data-leaked-online/', 'https://www.attentzorgenbehandeling.nl/nieuws/update-ongeautoriseerde-toegang-it-systemen', 'https://www.rtlnieuws.nl/nieuws/nederland/artikel/5370082/attent-zorg-behandeling-hack-ransomware-paspoorten-datalek', 'https://www.security.nl/posting/788375/Ransomwaregroep+publiceert+paspoorten+artsen+Gelderse+oudereninstelling'] |
2,042 | BianLian ransomware group targeted US-based Northeast Surgical Group in January 2022 | BianLian ransomware group targeted US-based Northeast Surgical Group (NESG) in January 2022. After BianLian added an unnamed medical group to their leak site, incident aggregator DataBreaches claimed to have identified it as NESG, though the company did not respond to repeated request for comment. Data from NESG surfaced on BreachForums in early February and BianLian's leak site. NESG addressed the diclosures affecting 15,300 patients on 6 March, in an incident notice on its website. Public reporting remains unclear about whether BianLian only stole and leaked the data or if the group also encrypted data on targeted systems. | 2023-01-08 | 2023-01-01 | Attack on critical infrastructure target(s) | null | Incident disclosed by attacker | Data theft & Doxing; Hijacking with Misuse | [['Northeast Surgical Group (NESG)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Health']] | ['BianLian Ransomware Group'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | 2023-01-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | BianLian Ransomware Group | null | null | BianLian Ransomware Group | null | Non-state-group | Criminal(s) | ['https://www.databreaches.net/northeast-surgical-group-notifies-15298-patients-of-a-hipaa-breach-but-doesnt-tell-them-their-information-has-been-dumped/'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 8 | No system interference/disruption | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Civic / political rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.databreaches.net/northeast-surgical-group-notifies-15298-patients-of-a-hipaa-breach-but-doesnt-tell-them-their-information-has-been-dumped/', 'https://www.nesg.com/index.php/notice-of-cybersecurity-incident/', 'https://breached.vc/Thread-Nesk-Medical-organization-USA'] |
2,043 | Website of German defence company Rheinmetall targeted by DDoS attack on 7 March 2022 | The website of the German defence company Rheinmetall was targeted by DDoS attack on 7 March 2022. Apart from a short unavailability of the website, no further impact has been recorded, according to Rheinmetall. German media sources relate this incident and other potential hacker activities against the company to its involvement in weapons delivery to Ukraine. | 2023-03-07 | 2023-03-07 | Attack on critical infrastructure target(s) | null | Incident disclosed by media (without further information on source) | Disruption | [['Rheinmetall']] | ['Germany'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['Critical infrastructure']] | [['Defence industry']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | System / ideology; Territory; Resources; International power | System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection | Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | Not available | Network Denial of Service | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Not available | none | none | 1 | Moderate - high political importance | 1 | Low | 6 | Day (< 24h) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | null | 0 | null | 0 | euro | Not available | Sovereignty | null | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.sueddeutsche.de/wirtschaft/rheinmetall-cyberattacke-gegen-ruestungsunternehmen-1.5764561'] |
2,044 | US-based Northern Essex Community College was hit by cyber attack in early February 2023 | The US-based Northern Essex Community College was hit by cyber attack in early February 2023. According to a spokesperson, it is unclear if the unauthorized access the college detected around 1 March was part of a ransomware attack, but several systems were no longer working. The spokesperson further claimed that the college does "not have evidence of any personal data being compromised". The college suspended classes for two days in response to the incident. | 2023-03-01 | null | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Disruption; Hijacking with Misuse | [['Northern Essex Community College (NECC)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Not available | Not available | true | Not available | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 6 | Days (< 7 days) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Economic, social and cultural rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://therecord.media/northern-essex-community-college-cyberattack', 'https://northernessex.cc/2023/03/necc-announcement-mar-5-2023/'] |
2,045 | Medusa ransomware group targeted Minneapolis Public Schools (MPS) in February 2023 | The Medusa ransomware group targeted Minneapolis Public Schools (MPS) in February 2023, according to an almost hour-long video from 7 March in which the group reveals stolen data, such as emails, student grades, building layouts, and payroll information. MPS reported on 1 March it had been able to restore systems and no ransom had been paid. | 2023-02-01 | 2023-02-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware | [['Minneapolis Public Schools (MPS)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | ['Medusa Ransomware Group'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | 2023-03-07 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | Medusa Ransomware Group | null | null | Medusa Ransomware Group | null | Non-state-group | Criminal(s) | ['https://twitter.com/chuksjonia/status/1633150165979725825'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration; Data Encrypted for Impact | Not available | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 5 | Moderate - high political importance | 5 | Medium | 11 | Weeks (< 4 weeks) | Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | null | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Civic / political rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://twitter.com/vxunderground/status/1633150837143883776', 'https://www.bleepingcomputer.com/news/security/medusa-ransomware-gang-picks-up-steam-as-it-targets-companies-worldwide/', 'https://twitter.com/chuksjonia/status/1633150165979725825', 'https://www.databreaches.net/medusa-claims-responsibility-for-minneapolis-public-schools-encryption-event-provides-proof-of-how-much-data-they-accessed/', 'https://mpls.k12.mn.us/technology_incident_update.html', 'https://mpls.k12.mn.us/mps_systems_outage_update_and_monday_s_return_to_schools.html', 'https://mpls.k12.mn.us/mps_systems_outage_update.html', 'https://www.bleepingcomputer.com/news/security/ransomware-gang-posts-video-of-data-stolen-from-minneapolis-schools/', 'https://therecord.media/ransomware-minneapolis-public-schools-stolen-data', 'https://twitter.com/vxunderground/status/1633125378347728896', 'https://www.databreaches.net/minneapolis-public-schools-systems-restored-no-ransom-paid/', 'https://therecord.media/minneapolis-public-schools-still-investigating-what-caused-encryption-event/', 'https://tarnkappe.info/lesetipps/lesetipps-und-wann-klopfen-die-hacker-auch-bei-euch-an-die-tuer-265998.html', 'https://www.databreaches.net/minneapolis-public-schools-tap-dances-around-telling-parents-and-employees-what-really-happened/', 'https://twitter.com/ransomwaremap/status/1629415883318730752', 'https://twitter.com/chuksjonia/status/1633156655742431233', 'https://twitter.com/nicoleperlroth/status/1633871105701343233', 'https://www.darkreading.com/threat-intelligence/medusa-gang-video-minneapolis-school-district-ransomed-data', 'https://twitter.com/cybersecboardrm/status/1634235221687308289', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2023-police-take-action/', 'https://twitter.com/ImposeCost/status/1634595846422511618', 'https://research.checkpoint.com/2023/13th-march-threat-intelligence-report/', 'https://www.databreaches.net/whats-new-in-ransomware-gang-pressure-tactics-not-as-much-as-you-might-think/', 'https://www.bleepingcomputer.com/news/security/medusa-ransomware-claims-attack-on-open-university-of-cyprus/'] |
2,046 | Pro-Russian hackers targeted website of Canadian TD Bank with DDoS attacks on 26 February 2023 | Pro-Russian hackers targeted the website of the Canadian TD Bank with DDoS attacks on 26 February 2023, according to a statement on Telegram. The website was not available for several hours on that day. Reporting on the incident, Journal de Montreal highlighted Canada's announcement from 24 February of a $32.5 million support package for Ukraine to help secure and stabilise the country as a potential motivation for the attack. | 2023-02-26 | 2023-02-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on critical infrastructure target(s) | null | Incident disclosed by attacker | Disruption | [['TD Bank']] | ['Canada'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Finance']] | ['We are Russian Hackers Community'] | ['Not available'] | ['Non-state-group'] | ['Hacktivist(s)'] | 2 | 2023-02-26; 2023-02-25 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | IT-security community attributes attacker; Attacker confirms | Alexis Rapin (Cybersecurits researcher at RDandurand, Canada); We are Russian Hackers Community | null | Canada; Not available | We are Russian Hackers Community; We are Russian Hackers Community | null | Non-state-group; Non-state-group | Hacktivist(s); Hacktivist(s) | ['https://twitter.com/alexis_rapin/status/1629881585590755331?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1629881585590755331%7Ctwgr%5E1a66aac67bec116ee0ecf8ac677ff84f2a13d4b3%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.journaldemontreal.com%2F2023%2F03%2F06%2Fcyberattaque-des-pirates-russes-auraient-attaque-la-banque-td', 'https://t.me/russianhackerscommunity/266'] | System / ideology; Territory; Resources; International power | System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection | Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | Not available | Network Denial of Service | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Not available | none | none | 1 | Moderate - high political importance | 1 | Minor | 5 | Day (< 24h) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Due diligence; Sovereignty | ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://twitter.com/Cyberknow20/status/1633059293430956034', 'https://t.me/russianhackerscommunity/266', 'https://twitter.com/alexis_rapin/status/1629881585590755331?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1629881585590755331%7Ctwgr%5E1a66aac67bec116ee0ecf8ac677ff84f2a13d4b3%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.journaldemontreal.com%2F2023%2F03%2F06%2Fcyberattaque-des-pirates-russes-auraient-attaque-la-banque-td', 'https://twitter.com/UK_Daniel_Card/status/1629904352629469189'] |
2,047 | Unidentified hackers stole sensitive data from DC Health Link servers in early March 2023 | Unidentified hackers stole sensitive personal information from DC Health Link servers, an organisation that administers the health care plans of members of the US House of Representatives, their staff and families, in early March 2023. As reported by the DailyCaller on 8 March, the US House Chief Administrative Officer disclosed the incident in an email to House members. According to BleepingComputer, data was offered for sale on a hacker forum on 6 March by a user named IntelBroker, who claims it was stolen during a breach of the DC Health Benefit Exchange Authority that manages the DC Health Link health insurance marketplace. A sampling of the stolen files found that the dataset contained sensitive personal information on about 170,000 people, including names, birth dates, home addresses, Social Security numbers and health insurance details. Among them, according to current figures, more than two dozen current or former members of Congress are also said to have been affected. The FBI and the Capitol Police are still investigating the incident. Another hacker calling himself "Denfur" also claims that the attack was born out of Russian patriotism, but independent verification is still pending. | 2023-03-01 | 2023-03-07 | Attack on critical infrastructure target(s) | null | Incident disclosed by attacker | Data theft & Doxing; Hijacking with Misuse | [['DC Health Link']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | 2023-03-06 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attribution by third-party | IntelBroker | null | null | null | null | Non-state-group | Hacktivist(s) | ['https://www.bleepingcomputer.com/news/security/fbi-investigates-data-breach-impacting-us-house-members-and-staff/'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 8 | No system interference/disruption | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Human rights; Sovereignty | Civic / political rights; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.bleepingcomputer.com/news/security/fbi-investigates-data-breach-impacting-us-house-members-and-staff/', 'https://twitter.com/henryrodgersdc/status/1633575335869521921', 'https://www.hackread.com/dc-health-link-hackers-congress-members-details/', 'https://www.darkreading.com/application-security/us-lawmakers-cyberattacks-physical-harm-dc-health-link-breach', 'https://cyberscoop.com/dc-health-exchange-breach-congress-defense-official/', 'https://twitter.com/Dinosn/status/1634156211518992387', 'https://www.wired.com/story/catholic-priest-doxing-security-roundup/', 'https://research.checkpoint.com/2023/13th-march-threat-intelligence-report/', 'https://cyberscoop.com/dc-health-data-posted-online/', 'https://krebsonsecurity.com/2023/03/feds-charge-ny-man-as-breachforums-boss-pompompurin/', 'https://www.bleepingcomputer.com/news/security/alleged-breachforums-owner-pompompurin-arrested-on-cybercrime-charges/', 'https://www.databreaches.net/was-there-a-rush-to-arrest-pompompurin-the-owner-of-breachforums-if-so-why/', 'https://www.bleepingcomputer.com/news/security/breached-hacking-forum-shuts-down-fears-its-not-safe-from-fbi/', 'https://www.databreaches.net/at-least-17-members-of-congress-had-sensitive-information-exposed-in-data-breach/', 'https://cyberscoop.com/dc-health-link-breach-russia-hacker-congress/', 'https://www.govinfosecurity.com/dc-health-link-facing-lawsuits-in-hack-affecting-congress-a-21496', 'https://www.databreaches.net/the-breachforums-case-the-hhs-oig-did-what-why/', 'https://www.wired.com/story/india-activist-manhunt-sikh-activist/', 'https://twitter.com/aselawaid/status/1639447799896088577', 'https://cyberscoop.com/breachforums-arrest-cybercrime-underground/'] |
2,048 | North Korean state-sponsored hacking group UNC2970 targeted US and European media and technology companies since at least June 2022 | The North Korea-linked APT UNC2970 has launched phishing-based espionage campaigns against US and European media and technology companies since at least mid-2022, based on observations by Mandiant from June 2022. Mandiant, with high confidence, identified UNC2970 as UNC577, an activity cluster commonly associated with the Lazarus Group. Also known as Temp.Hermit, UNC577 has been active since at least 2013 and is suspected of sharing malware and tools with other North Korean threat actors.
UNC2970 conducted its phishing campaign via fraudulent job offerings and has more recently utilised LinkedIn to approach victims. During one of the operations tracked by Mandiant targeting security researchers, UNC2970 deployed three new malware families (TOUCHMOVE, SIDESHOW, and TOUCHSHIFT). | 2022-06-01 | null | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals | Attack conducted by a state-affiliated group (includes state-sanctioned, state-supported, state-controlled but officially non-state actors) (“cyber-proxies”) / a group that is generally attributed as state-affiliated | Incident disclosed by IT-security company | Hijacking without Misuse | [['Not available'], ['Not available']] | ['Europe (region)', 'United States'] | [[], ['NATO', 'NORTHAM']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)', 'Media']] | null | ['TEMP.Hermit/ UNC577 < Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Lab 110)'] | ["Korea, Democratic People's Republic of"] | ['Non-state actor, state-affiliation suggested'] | ['Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case)'] | 2 | 2023-03-09; 2022-11-29 | Technical report (e.g., by IT-companies, Citizen Lab, EFF); Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker; IT-security community attributes attacker | Mandiant; Mandiant | Mandiant; nan | United States; United States | TEMP.Hermit/ UNC577 < Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Lab 110); TEMP.Hermit/ UNC577 < Lazarus Group/Labyrinth Chollima/HIDDEN COBRA/Guardians of Peace/ZINC/NICKEL ACADEMY/NewRomanic Cyber Army Team/Whois Hacking Team/Appleworm/Group 77/G0032 (Reconnaissance General Bureau, Bureau 121, Lab 110) | Korea, Democratic People's Republic of; Korea, Democratic People's Republic of | Non-state actor, state-affiliation suggested; Non-state actor, state-affiliation suggested | Non-state-group, state-affiliation suggested (widely held view for the attributed initiator (group), but not invoked in this case); | ['https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970', 'https://www.mandiant.com/resources/blog/mapping-dprk-groups-to-government'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | Phishing | Not available | Not available | false | Not available | Not available | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | Minor | 3 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | Not available | 0 | Not available | 0 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970', 'https://www.mandiant.com/resources/blog/lightshift-and-lightshow', 'https://www.mandiant.com/resources/blog/mapping-dprk-groups-to-government', 'https://twitter.com/cybereason/status/1634290029030789149', 'https://twitter.com/Dinosn/status/1634264331121467415', 'https://twitter.com/ImposeCost/status/1634030788512477184', 'https://cyberscoop.com/north-korea-hackers-linkedin-phishing/', 'https://thehackernews.com/2023/03/north-korean-unc2970-hackers-expands.html', 'https://twitter.com/obiwan666/status/1634480773813223424', 'https://twitter.com/jasonnurse/status/1634466599146082305', 'https://twitter.com/jaysonstreet/status/1634417033818537984', 'https://www.bleepingcomputer.com/news/security/security-researchers-targeted-with-new-malware-via-job-offers-on-linkedin/', 'https://twitter.com/randomuserid/status/1634588793842937858', 'https://www.darkreading.com/application-security/north-korean-hackers-targeting-security-researchers', 'https://www.govinfosecurity.com/north-korean-hackers-find-value-in-linkedin-a-21424', 'https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/a-growing-goldmine-your-linkedin-data-abused-for-cybercrime'] |
2,050 | BianLian ransomware group targeted city of Waynesboro stealing government information and police data in January 2023 | The BianLian ransomware group targeted the city of Waynesboro, Virginia (USA), stealing government and police data. The incident potentially matches with malicious activity the city administration was informed about in January 2023. In an online post, BianLian claimed to be in possession of more than 350GB of data including internal police files, such as investigation documentation and personal staff data. Public reporting did not immediately disclose whether attackers also succeeded in encrypting data on target systems. According to the city's manager, the cyberattack has been remediated and protective measures put in place to prevent future attacks. | 2023-01-01 | 2023-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft; Hijacking with Misuse | [['Waynesboro, Virginia']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system', 'State institutions / political system']] | [['Civil service / administration', 'Police']] | ['BianLian Ransomware Group'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | 2023-03-01 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | BianLian | null | null | BianLian Ransomware Group | null | Non-state-group | Criminal(s) | ['https://twitter.com/BrettCallow/status/1632884957663354880'] | Not available | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Not available; Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | Not available | Not available | 4 | Moderate - high political importance | 4 | Low | 6 | No system interference/disruption | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 0 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/city-of-waynesboro-targeted-in-cyber-attack/', 'https://www.scmagazine.com/brief/ransomware/virginia-city-claimed-to-be-attacked-by-bianlian-ransomware', 'https://www.nbc29.com/2023/03/08/city-waynesboro-targeted-cyber-attack/', 'https://augustafreepress.com/news/ransomware-group-claims-it-has-infiltrated-waynesboro-city-government-files/', 'https://twitter.com/BrettCallow/status/1632884957663354880'] |
2,053 | Healthcare Clinic Santa Chiara in Switzerland hit by ransomware attack in February 2023 | Unknown actors targeted the Clinica Santa Chiara (Locarno, Switzerland) with ransomware during the week of 27 February 2023. The clinic did not pay the ransom and saw a significant portion of its data encrypted. The clinic responded by isolating IT systems to prevent any further damage, also clarifying that no health data had been compromised in the course of the attack. | 2023-01-01 | 2023-01-01 | Attack on critical infrastructure target(s) | null | Incident disclosed by media (without further information on source) | Disruption; Hijacking with Misuse; Ransomware | [['Clinica Santa Chiara']] | ['Switzerland'] | [['EUROPE', 'WESTEU']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | Not available | null | Not available | Data Encrypted for Impact | Not available | true | Not available | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 8 | Days (< 7 days) | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | No justification under IL | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://twitter.com/Dennis_Kipker/status/1634198361862488064', 'https://www.redhotcyber.com/post/attacco-informatico-alla-clinica-santa-chiara-di-locarno-i-dati-esfiltrati-non-contengono-dati-sanitari/', 'https://www.inside-it.ch/tessiner-privatklinik-opfer-eines-cyberangriffs-20230308'] |
2,056 | Vice Society ransomware group attacked Berkeley County School System in February 2023 | The Vice Society ransomware group attacked the Berkeley County School System in West Virginia (USA), on 3 February 2023. Classes had to be suspended for one day to address the incident. Following Berkeley County Schools' refusal to pay the ransom, Vice Society leaked internal data, including employee social security numbers, on 10 March 2023, as reported by DataBreaches.
Published files also included details about behavior intervention plans and functional behavior assessments for certain students that may reveal sensitive information about students, such as diagnoses, medications, or home issues. | 2023-02-03 | 2023-03-10 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware | [['Berkeley County Schools']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | ['Vice Society'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | 2023-03-10 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | Vice Society | null | null | Vice Society | null | Non-state-group | Criminal(s) | ['https://www.databreaches.net/highly-sensitive-files-from-berkeley-county-schools-dumped-by-ransomware-gang/'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | true | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 6 | Moderate - high political importance | 6 | Low | 10 | Days (< 7 days) | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/highly-sensitive-files-from-berkeley-county-schools-dumped-by-ransomware-gang/', 'https://www.databreaches.net/highly-sensitive-files-from-berkeley-county-schools-dumped-by-ransomware-gang/', 'https://www.berkeleycountyschools.org/cms/lib/WV01000962/Centricity/Domain/1/BCS%20Notice%20of%20Data%20Breach.pdf', 'https://twitter.com/UK_Daniel_Card/status/1634604262029246464', 'https://therecord.media/minneapolis-public-schools-still-investigating-what-caused-encryption-event/', 'https://therecord.media/west-virginia-students-returning-to-class-after-days-long-outage-following-cyberattack/', 'https://www.smore.com/8qzg2', 'https://twitter.com/BerkCoSchoolsWV/status/1621526301378240521?ref%5Fsrc=twsrc%5Etfw', 'https://www.smore.com/5r4gd?utm%5Fsource=twitter&utm%5Fmedium=social&utm%5Fcontent=ap%5Fqs69x4ndda', 'https://www.smore.com/x7whs?utm%5Fsource=twitter&utm%5Fmedium=social&utm%5Fcontent=ap%5Ffz8zjo13nc', 'https://www.smore.com/1quse', 'https://research.checkpoint.com/2023/13th-march-threat-intelligence-report/'] |
2,057 | Saint-Pierre Hospital in Brussels hit by cyberattack in March 2023 | Unknown attackers launched a cyberattack against the Saint-Pierre Hospital in Brussels on 11 March 2023. In line with the hospital's incident response plan, servers managing electronic patient files were shut down. For the first half of the day, the emergency room was closed and ambulances redirected, to allow staff to maintain operations, while the hospital was running on a paper-based system. The incident further limited access to patient files. By the end of the day, service of the telephone/information systems and the emergency room had been restored.
| 2023-03-10 | 2023-03-11 | Attack on critical infrastructure target(s) | null | Incident disclosed by media (without further information on source); Incident disclosed by victim | Disruption; Hijacking with Misuse | [['CHU Saint-Pierre']] | ['Belgium'] | [['EUROPE', 'EU', 'NATO', 'WESTEU']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Not available | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Low | 8 | Day (< 24h) | Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | null | 0 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://twitter.com/ransomwaremap/status/1634639503259320321', 'https://www.lesoir.be/500384/article/2023-03-11/retour-la-normale-au-chu-saint-pierre-cible-dune-cyberattaque'] |
2,061 | ZOLL Medical hit by hack-and-leak operation in January 2023 | ZOLL Medical, a healthcare firm, was targeted with a cyberattack from unknown actors on 28 January 2023, with private health information being leaked on or around 2 February 2023, according to DataBreaches. This leak contained data of more than one million patients, including social security numbers, date of birth, and adresses - but also affected personal health information, such as the use or consideration of use of a ZOLL-manufactured wearable defibrillator. ZOLL did not provide further information regarding the type of the attack or whether the company had received any ransom demands. A few weeks after the incident became public, at least seven class action lawsuits were filed against the company, alleging Zoll negligently failed to protect sensitive information of individuals. | 2023-01-28 | 2023-02-02 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft & Doxing; Hijacking with Misuse | [['ZOLL Medical']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 8 | No system interference/disruption | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 1 | 2023-03-15 00:00:00 | Other legal measures on national level (e.g. law enforcement investigations, arrests) | null | United States | Robert Smith | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/zoll-medical-notifying-1004443-patients-of-data-breach-hipaa/', 'https://www.govinfosecurity.com/heart-device-maker-says-hack-affected-1-million-patients-a-21425', 'https://www.govinfosecurity.com/device-maker-zoll-facing-7-lawsuits-in-wake-breach-a-21522', 'https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/zoll-lawsuit-by-robert-smith-3-15-23.pdf'] |
2,063 | Cyber-espionage hacking group Dark Pink gained access to networks of Southeast Asian military targets and governments beginning in February 2023 | The cyber-espionage hacking group Dark Pink gained access to networks of Southeast Asian military targets and governments beginning on 1 February 2023, according to a technical report by IT security company EclecticIQ. Spearphishing lures for breaking into the networks were centered on ASEAN relations with European countries.
The report attributed this incident with a high degree of probability to the Dark Pink hacking group based on strong operational overlaps with activity that Group-IB had associated with Dark Pink in January. Building on these previously observed patterns, Dark Pink in the present case deployed an advanced version of the KamiKakaBot malware with improved detection evasion features. EclecticIQ assessed with low confidence that Dark Pink is operated by a Chinese group. | 2023-02-01 | null | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | [['Not available']] | ['Southeast Asia (region)'] | null | [['State institutions / political system', 'State institutions / political system']] | [['Government / ministries', 'Military']] | ['Dark Pink'] | ['China'] | ['Unknown - not attributed'] | null | 1 | 2023-03-10 00:00:00 | Technical report (e.g., by IT-companies, Citizen Lab, EFF) | IT-security community attributes attacker | EclecticIQ | null | Netherlands | Dark Pink | China | Unknown - not attributed | null | ['https://blog.eclecticiq.com/dark-pink-apt-group-strikes-government-entities-in-south-asian-countries'] | International power | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | Phishing | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 3 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | Not available | 0 | Not available | 0 | Not available | 0 | euro | Not available | Cyber espionage; Sovereignty | ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://thehackernews.com/2023/03/kamikakabot-malware-used-in-latest-dark.html', 'https://blog.eclecticiq.com/dark-pink-apt-group-strikes-government-entities-in-south-asian-countries', 'https://www.govinfosecurity.com/dark-pink-apt-group-very-likely-back-in-action-a-21426', 'https://securityaffairs.com/143415/apt/dark-pink-apt-south-asia.html', 'https://securityaffairs.com/143707/breaking-news/security-affairs-newsletter-round-411-by-pierluigi-paganini.html', 'https://twitter.com/securityaffairs/status/1635381821646200849'] |
2,064 | Unknown hackers breached the Death Registry System of Hawaii in January 2023 | Unknown hackers breached the Electronic Death Registry System (EDRS) of Hawaii in January 2023. On 10 March, officials of Hawaii's Department of Health stated that the families of the affected should remain vigilant about potential misuse of the compromised data. Although death certificates were not accessed, the data contains sensitive personal information, such as names, social security numbers, and information on the cause of death. The attack was orchestrated through the use of a compromised account belonging to a medical certifier that had left their job in 2021. According to cybersecurity firm Mandiant, the account information was sold on the dark web. Although the attacker has not yet been publicly identified, the Hawaii Department of Health disclosed that two IP adresses from Kentucky, USA, and the Netherlands had been tied to suspicious access patterns of the system. | 2023-01-20 | 2023-01-01 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by victim | Data theft; Hijacking with Misuse | [['Hawaii State Department of Health']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Government / ministries']] | null | null | null | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 1 | 2023-03-09 00:00:00 | State Actors: Preventive measures | Awareness raising | United States | Department of Health, State of Hawaii (USA) | No | null | Valid Accounts | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 6 | No system interference/disruption | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Human rights; Sovereignty | Civic / political rights; | Not available | 0 | null | null | null | null | null | null | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://therecord.media/hawaii-death-records-system-data-breach-notification', 'https://health.hawaii.gov/news/newsroom/department-of-health-to-send-notifications-regarding-unauthorized-access-to-electronic-death-registry-system/', 'https://www.hawaiipublicradio.org/local-news/2023-03-10/cyberattack-on-states-electronic-death-registry-affected-about-3-400-records', 'https://twitter.com/InfoSecSherpa/status/1635356867101876224'] |
2,065 | Unknown advanced threat actor targeted multiple government and government-related targets using a FortiOS vulnerability | Fortinet reports that a sudden system stop and subsequent startup failure of several FortiGate units belonging to a customer prompted an investigation of attacks aimed at a vulnerability in FortiOS (FG-IR-22-369 / CVE-2022-41328). Due to the complexity of the attack, the company is suspecting an advanced threat actor, without disclosing any further details. Exploitations of the vulnerability focus on governments and large organizations. | null | null | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by IT-security company | Data theft; Hijacking with Misuse | [['Not available']] | ['Not available'] | null | [['Unknown', 'State institutions / political system']] | [['', 'Government / ministries']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | Yes | null | Exploit Public-Facing Application | Data Exfiltration; Firmware Corruption; System Shutdown/Reboot | null | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 3 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | Not available | 0 | Not available | 0 | Not available | 0 | euro | Not available | Cyber espionage; Sovereignty | ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.bleepingcomputer.com/news/security/fortinet-new-fortios-bug-used-as-zero-day-to-attack-govt-networks/', 'https://www.fortinet.com/blog/psirt-blogs/fg-ir-22-369-psirt-analysis', 'https://www.fortiguard.com/psirt/FG-IR-22-369', 'https://thehackernews.com/2023/03/fortinet-fortios-flaw-exploited-in.html', 'https://securityaffairs.com/143458/hacking/attacks-fortinet-fortios.html', 'https://www.darkreading.com/vulnerabilities-threats/cyberattackers-continue-assault-against-fortinet-devices', 'https://www.bleepingcomputer.com/news/security/fortinet-zero-day-attacks-linked-to-suspected-chinese-hackers/', 'https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem', 'https://www.govinfosecurity.com/chinese-hackers-targeting-security-network-appliances-a-21467', 'https://securityaffairs.com/143594/apt/china-fortinet-zero-day-attacks.html', 'https://securityaffairs.com/143707/breaking-news/security-affairs-newsletter-round-411-by-pierluigi-paganini.html', 'https://thehackernews.com/2023/03/chinese-hackers-exploit-fortinet-zero.html', 'https://www.darkreading.com/attacks-breaches/attackers-probing-zero-day-vulns-edge-infrastructure'] |
1,899 | Unknown actors gained access to the networks of British engineering company Vesuvius | Unknown actors gained access to the networks of British engineering company Vesuvius, requiring it to temporarily shut down operations, according to legally required declarations by the publicly-traded company of inside information that resulted from its ongoing investigations of the incident. | null | null | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Hijacking without Misuse | [['Vesuvius plc']] | ['United Kingdom'] | [['EUROPE', 'NATO', 'NORTHEU']] | [['Critical infrastructure']] | [['Critical Manufacturing']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Not available | Not available | false | Not available | Not available | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | Minor | 3 | No system interference/disruption | Not available | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/hackers-hit-vesuvius-uk-engineering-company-shuts-down-affected-systems/', 'https://www.londonstockexchange.com/news-article/VSVS/cyber-security-incident/15824555', 'https://www.infosecurity-magazine.com/news/uk-metalg-firm-vesuvius-cyberattack/', 'https://www.insurancejournal.com/news/international/2023/02/06/706216.htm', 'https://grahamcluley.com/hackers-hit-vesuvius-uk-engineering-company-shuts-down-affected-systems/'] |
2,075 | Cyberattack on Latitude Financial results in theft of 300,000 customer documents in March 2023 | Latitude Financial, an Australian financial lending company, was hit in March 2023 by a cyberattack from unknown actors, which resulted in the theft of over 300,000 customer documents (103,000 identification documents and 225,000 customer records). The attack originated at a third-party vendor contracted by Latitude. While active on Latitude's networks, the intruder was able to obtain an employee's login credentials, further enabling access to two other service providers, from where the identification documents and customer records were stolen. | 2023-03-01 | 2023-03-16 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft; Hijacking with Misuse | [['Not available'], ['Latitude Financial']] | ['Not available', 'Australia'] | [[], ['OC']] | [['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure']] | [[''], ['Finance']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available; Valid Accounts | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 4 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | null | 0 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/latitude-financial-hacked-as-300000-customer-identification-documents-stolen/', 'https://www.abc.net.au/news/2023-03-16/latitude-hack-300000-identity-documents-stolen/102104424', 'https://www.news.com.au/finance/business/other-industries/latitude-customers-already-having-their-accounts-hacked-day-after-company-announces-malicious-cyber-attack/news-story/331633f8555c9dd3cc9006498e30d0e7', 'https://investors.latitudefinancial.com.au/DownloadFile.axd?file=/Report/ComNews/20230316/02644401.pdf&tlga=1111382795.1679040612&adobe_mc=MCMID%3D05814445310871754421376757778548396901%7CMCORGID%3DB6D9B74F57B2FBE97F000101%2540AdobeOrg%7CTS%3D1679040624&_ga=2.261357710.202369688.1679040612-1111382795.1679040612', 'https://www.bleepingcomputer.com/news/security/latitude-cyberattack-leads-to-data-theft-at-two-service-providers/', 'https://www.databreaches.net/whats-happening-with-the-latitude-financial-cyber-attack-millions-of-customer-details-stolen-in-one-of-the-largest-known-data-breaches-in-australia/', 'https://www.govinfosecurity.com/latitude-financial-admits-14m-customer-details-breached-a-21543', 'https://www.hackread.com/latitude-financial-data-breach/', 'https://www.bleepingcomputer.com/news/security/latitude-financial-data-breach-now-impacts-14-million-customers/', 'https://securityaffairs.com/144137/data-breach/latitude-data-breach-14m-individuals.html'] |
2,076 | Unknown actors compromised networks across various industry sectors and several countries using Trigona ransomware beginning in December 2022 | Unknown actors compromised the networks of at least 15 targets in various industry sectors across several countries using the relatively unknown Trigona ransomware beginning in December 2022, according to a technical reporty by Palo Alto Networks.
The 15 targets are organisations in the manufacturing, finance, construction, agriculture, marketing, and high-tech industries with a presence in the US, Italy, France, Germany, Australia, and New Zealand. | 2022-12-01 | null | Attack on critical infrastructure target(s) | null | Incident disclosed by IT-security company | Data theft; Disruption; Hijacking with Misuse; Ransomware | [['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available'], ['Not available']] | ['France', 'United States', 'New Zealand', 'Australia', 'Italy', 'Germany'] | [['EUROPE', 'NATO', 'EU', 'WESTEU'], ['NATO', 'NORTHAM'], ['OC'], ['OC'], ['EUROPE', 'NATO', 'EU'], ['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)'], ['Critical infrastructure', 'Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Finance', ''], ['Finance', ''], ['Finance', ''], ['Finance', ''], ['Finance', ''], ['Finance', '']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Unknown | null | Unknown | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration; Data Encrypted for Impact; Inhibit System Recovery; Service Stop | Not available | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 5 | Moderate - high political importance | 5 | Medium | 11 | Weeks (< 4 weeks) | Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data | 11-50 | 0 | null | 0 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://unit42.paloaltonetworks.com/trigona-ransomware-update/', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2023-shifting-to-data-extortion/', 'https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-14th-2023-a-focus-on-stolen-data/'] |
2,077 | Medical Group Orlando Family Physicians affected by data breach in 2021 | Medical Group Orlando Family Physicians (OFP) was targeted through a phishing attack by unknown threat actors in April 2021, which enabled the theft of sensitive personal details of 447,426 patients (including health information, health insurance information, Medicare beneficiary numbers, and passport numbers). The attack compromised four employee email accounts, which were all terminated by OFP. Forensic evidence discovered during the investigation of the incident suggests the threat actor(s) intended to commit financial fraud against OFP and did not specifically pursue data on the affected individuals.
In March 2023, a class action lawsuit against Orlando Family Physicians was settled for an undisclosed sum. | 2021-04-15 | 2021-04-15 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft | [['Orlando Family Physicians']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Health']] | null | null | null | null | 1 | null | null | null | null | null | null | null | null | None; Unknown - not attributed | null | ['https://www.businesswire.com/news/home/20210720006100/en/Orlando-Family-Physicians-Experiences-Email-Phishing-Incident'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Phishing | Account Access Removal; Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Not available | none | none | 2 | Moderate - high political importance | 2 | Low | 6 | No system interference/disruption | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Not available | null | Not available | 0 | null | null | null | null | null | null | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/orlando-family-physicians-data-breach-class-action-settlement/', 'https://www.businesswire.com/news/home/20210720006100/en/Orlando-Family-Physicians-Experiences-Email-Phishing-Incident'] |
2,078 | Clop ransomware group suspected to have compromised Japanese Hitachi Energy using a 0-day vulnerability in Fortra GoAnywhere MFT | The Clop ransomware group is suspected to have compromised Japanese Hitachi Energy using a 0-day vulnerability (CVE-2023-0669) in Fortra GoAnywhere Managed File Transfer (MFT), gaining access to certain employee data. Hitachi Energy confirmed the incident in a press statement.
Hitachi Energy appears as one of many victims targeted by Clop. The ransomware group claims to have attacked 130 organisations via third-party vendor Fortra, the majority of which has not been publicly named.
| null | null | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Hijacking without Misuse | [['Hitachi Energy'], ['Fortra']] | ['Japan', 'United States'] | [['ASIA', 'SCS', 'NEA'], ['NATO', 'NORTHAM']] | [['Critical infrastructure'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Energy'], ['']] | ['Clop Ransomware Group'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 1 | 2023-03-16 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | Clop | null | null | Clop Ransomware Group | null | Non-state-group | Criminal(s) | ['https://www.bleepingcomputer.com/news/security/hitachi-energy-confirms-data-breach-after-clop-goanywhere-attacks/'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | Yes | One | Exploit Public-Facing Application | Not available | Not available | false | Not available | Not available | Hijacking, not used - empowerment (incident scores 1 point in intensity) | none | none | 1 | Moderate - high political importance | 1 | Minor | 4 | No system interference/disruption | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Sovereignty | null | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2023-shifting-to-data-extortion/', 'https://twitter.com/thegrugq/status/1639245149288136705', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/', 'https://www.bleepingcomputer.com/news/security/hitachi-energy-confirms-data-breach-after-clop-goanywhere-attacks/', 'https://www.hitachienergy.com/news/features/2023/03/third-party-cybersecurity-incident', 'https://www.databreaches.net/hitachi-energy-latest-victim-of-clop-goanywhere-attacks/', 'https://securityaffairs.com/143640/data-breach/hitachi-energy-data-breach.html', 'https://securityaffairs.com/143707/breaking-news/security-affairs-newsletter-round-411-by-pierluigi-paganini.html', 'https://research.checkpoint.com/2023/20th-march-threat-intelligence-report/', 'https://www.malwarebytes.com/blog/news/2023/03/a-week-in-security-march-13-19', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-saks-fifth-avenue-retailer-says-mock-data-stolen/', 'https://www.bleepingcomputer.com/news/security/city-of-toronto-confirms-data-theft-clop-claims-responsibility/', 'https://www.databreaches.net/more-victims-possibly-identify-in-goanywhere-vulnerability-incident/', 'https://www.schneier.com/blog/archives/2023/03/mass-ransomware-attack.html', 'https://therecord.media/uk-pension-protection-fund-clop-goanywhere-fortra', 'https://twitter.com/securityaffairs/status/1639336758704734209', 'https://securityaffairs.com/143938/breaking-news/city-of-toronto-clop-ransomware.html', 'https://www.bleepingcomputer.com/news/security/procter-and-gamble-confirms-data-theft-via-goanywhere-zero-day/', 'https://www.darkreading.com/attacks-breaches/clop-keeps-racking-up-ransomware-victims-with-goanywhere-flaw-', 'https://twitter.com/cahlberg/status/1639207960693051392', 'https://twitter.com/InfoSecSherpa/status/1639058268252422144', 'https://www.bleepingcomputer.com/news/security/crown-resorts-confirms-ransom-demand-after-goanywhere-breach/', 'https://securityaffairs.com/144193/data-breach/crown-resorts-clop-ransomware.html', 'https://therecord.media/tasmania-government-ransomware-clop-student-documents', 'https://www.malwarebytes.com/blog/threat-intelligence/2023/04/ransomware-review-april-2023'] |
2,079 | Spanish HLA Grupo Hospitalario hit by data breach leaking 45,000 patients' records | Spanish HLA Grupo Hospitalario, a healthcare company, was hit by a cyber attack on or around 14 March 2023, through a misconfigured web server, which allowed an intruder to steal the data of 45,000 patients and 1,600 doctors (including names, phone numbers, email addresses, and internal communications as well as the national and tax identifiacation numbers of affected healthcare professionals). Some of this data was subsequently leaked on 14 March 2023. The health insurance group Asisa, which owns the hospital network, acknowledged on the next day that it was looking into the reported incident. | 2023-03-01 | 2023-03-14 | Attack on critical infrastructure target(s) | null | Incident disclosed by attacker | Data theft & Doxing; Hijacking with Misuse | [['HLA Grupo Hospitalario']] | ['Spain'] | [['EUROPE', 'NATO', 'EU']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | 2023-03-14 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | null | null | null | null | null | null | null | ['https://cronicaglobal.elespanol.com/vida/asisa-alerta-seguridad-hla-grupo-hospitalario_783983_102.html'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 8 | No system interference/disruption | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | null | 0 | Not available | 0 | euro | Not available | Human rights; Sovereignty | Civic / political rights; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.databreaches.net/bits-n-pieces-trozos-y-piezas-32/', 'https://euroweeklynews.com/2023/03/16/personal-data-of-50000-users-stolen-in-alleged-cyberattack-on-asisa-network-of-hla-grupo-hospitals-in-spain/', 'https://cronicaglobal.elespanol.com/vida/asisa-alerta-seguridad-hla-grupo-hospitalario_783983_102.html', 'https://almeriagold.com/personal-data-of-50000-users-stolen-in-alleged-cyberattack-on-asisa-network-of-hla-grupo-hospitals-in-spain/'] |
2,080 | Russian hacktivist group Phoenix compromised Indian health ministry's health management system in 2023 | The Russian hacktivist group Phoenix launched an attack against the Indian Health Ministry's health management information system (HMIS) in 2023, in which the group gained access to HMIS portal and stole hospital, employee, and physician data, the cybersecurity firm CloudSEK reported. The attack occured against the backdrop of a meeting of G20 finance ministers hosted by India in late February, during which several member states sought a condemnation of Russia over its invasion of Ukraine and questions about India's participation in a G7-brokered oil price cap agreement designed to set a price ceiling for Russian oil exports. India's Computer Emergency Response Team has been tasked with investigating the incident. | 2023-01-01 | 2023-01-01 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Data theft; Hijacking with Misuse | [['Ministry of Health']] | ['India'] | [['ASIA', 'SASIA', 'SCO']] | [['State institutions / political system']] | [['Government / ministries']] | ['Phoenix'] | ['Russia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | 2023-03-15 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | Phoenix | null | Russia | Phoenix | Russia | Non-state-group | Hacktivist(s) | ['https://cloudsek.com/threatintelligence/russian-hacktivist-group-phoenix-targets-indias-health-ministry-website'] | System / ideology; Territory; Resources; International power | System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection | Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Low | 7 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Civic / political rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.databreaches.net/website-intrusion-attempt-indias-department-of-health-seeks-help-from-chot-in/', 'https://cloudsek.com/threatintelligence/russian-hacktivist-group-phoenix-targets-indias-health-ministry-website', 'https://pipanews.com/website-intrusion-attempt-department-of-health-seeks-help-from-chot-in-pipa-news/'] |
2,086 | Independent Living Systems targeted in data breach affecting over four million people during June-July 2022 | Florida-based Independent Living Systems (ILS), a healthcare services provider, was targeted by unknown actors between 30 June and 5 July 2022, resulting in the theft of potentially sensitive personal data of over 4.2 million individuals, including names, addresses, dates of birth, health insurance information, social security numbers, billing information, and medical records containing details on diagnoses, treatments, prescriptions and other mental and physical health assessments. In its incident notification, ILS does not directly clarify whether the attack involved ransomware but notes the attack rendered certain computer systems inaccessible, a description that could fit a ransomware attack. ILS took action to remedy the impact of the attack and alerted authorities, which confirmed the scope of the breach. The breach was confirmed by ILS in September 2022 and affected customers were notified in March 2023. | 2022-06-30 | 2022-07-05 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft; Hijacking with Misuse | [['Not available'], ['Independent Living Systems (ILS)']] | ['United States', 'United States'] | [['NATO', 'NORTHAM'], ['NATO', 'NORTHAM']] | [['Critical infrastructure'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Health'], ['']] | null | null | null | null | 1 | null | null | null | null | null | null | null | null | None; Unknown - not attributed | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 6 | No system interference/disruption | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Not available | null | Not available | 0 | null | null | null | null | null | null | null | No response justified (missing state attribution & breach of international law) | null | ['https://securityaffairs.com/143832/data-breach/independent-living-systems-data-breach.html', 'https://therecord.media/ils-data-breach-patient-information', 'https://www.cpomagazine.com/cyber-security/massive-data-breach-at-healthcare-provider-ils-compromises-millions-of-patients/', 'https://apps.web.maine.gov/online/aeviewer/ME/40/aacdb720-e082-4ef6-b7e6-f03280b2c4ec.shtml', 'https://www.prnewswire.com/news-releases/independent-living-systems-provides-notice-of-data-event-301771989.html', 'https://www.bleepingcomputer.com/news/security/healthcare-provider-ils-warns-42-million-people-of-data-breach/', 'https://www.databreaches.net/independent-living-systems-updates-its-breach-disclosure-notifying-more-than-4-2-million-patients/', 'https://www.govinfosecurity.com/long-term-care-services-firm-says-breach-affects-42-million-a-21448', 'https://securityaffairs.com/144054/breaking-news/security-affairs-newsletter-round-412-by-pierluigi-paganini.html'] |
2,098 | Russia-linked Clop ransomware group disrupted US Wellness computer systems using a Fortra GoAnywhere vulnerability in early 2023 | The Russia-linked Clop ransomware group disrupted US Wellness's access to certain of its computer systems using a vulnerability in Fortra's GoAnywhere file transfer solution on 31 January 2023 at the earliest.
Healthcare provider US Wellness reported the ransomware attack in a notification letter to the California Attorney General on 22 March 2023. In this notification letter, US Wellness stated that personal information of its customers may have been affected. This includes names, addresses, dates of birth, member ID numbers, where the service originated, and addresses of the service location.
This incident is one in a series of reports related to the exploitation of a zero-day vulnerability in Fortra GoAnywhere Managed File Transfer (CVE-2023-0669) by the Clop ransomware group. On 10 February 2023, the Clop Ransomware group claimed to have compromised 130 organisations through the security floaw in an statement to the IT news website Bleeping Computer. | 2023-01-31 | 2023-01-01 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft; Disruption; Hijacking with Misuse | [['US Wellness'], ['Fortra']] | ['United States', 'United States'] | [['NATO', 'NORTHAM'], ['NATO', 'NORTHAM']] | [['Critical infrastructure'], ['Corporate Targets (corporate targets only coded if the respective company is not part of the critical infrastructure definition)']] | [['Health'], ['']] | ['Clop Ransomware Group'] | ['Russia'] | ['Non-state-group'] | ['Criminal(s)'] | 2 | 2023-03-24; 2023-02-10 | Media report (e.g., Reuters makes an attribution statement, without naming further sources); Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Media-based attribution; Attacker confirms | TechCrunch; Clop | null | United States; United States | Clop Ransomware Group; Clop Ransomware Group | Russia; Not available | Non-state-group; Non-state-group | Criminal(s); Criminal(s) | ['https://techcrunch.com/2023/03/24/fortra-goanywhere-clop-ransomware/', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | Yes | One | Exploit Public-Facing Application | Data Exfiltration | null | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 5 | Moderate - high political importance | 5 | Low | 9 | Days (< 7 days) | Minor data breach/exfiltration (no critical/sensitive information), data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Civic / political rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Countermeasures under international law justified (state-atttribution & breach of international law) | null | ['https://www.databreaches.net/fortra-told-breached-companies-their-data-was-safe/', 'https://oag.ca.gov/system/files/US%20Wellness%20-%20Adult%20Notification%20Letter%20%28General%29.pdf', 'https://techcrunch.com/2023/03/24/fortra-goanywhere-clop-ransomware/', 'https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/', 'https://twitter.com/lorenzofb/status/1639372433516900353', 'https://twitter.com/zackwhittaker/status/1639372041848512515', 'https://www.malwarebytes.com/blog/threat-intelligence/2023/04/ransomware-review-april-2023'] |
2,100 | Pro-Russian hacker group NoName057(16) disrupted the website of French National Assembly on 26 March 2023 | The pro-Russian hacker group NoName057(16) claimed to have disrupted the website of the French National Assembly on 26 March 2023.
In the announcement of their actions on Telegram, the hackers purported to side with popular protests against the President Macron's pension reform adopted in the previous week and baselessly compared the French government's assistance to Ukraine with support to neo-Nazis.
The group also advanced similar claims for the website of the French Senate, without any immediate evidence of impaired access. | 2023-03-26 | 2023-03-26 | Attack conducted by non-state group / non-state actor with political goals (religious, ethnic, etc. groups) / undefined actor with political goals; Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by attacker | Disruption | [['National Assembly (France)']] | ['France'] | [['EUROPE', 'NATO', 'EU', 'WESTEU']] | [['State institutions / political system']] | [['Legislative']] | ['NoName057(16)'] | ['Russia'] | ['Non-state-group'] | ['Hacktivist(s)'] | 1 | 2023-03-27 00:00:00 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms | NoName057(16) | null | Russia | NoName057(16) | Russia | Non-state-group | Hacktivist(s) | ['https://t.me/noname05716eng/977', 'https://t.me/noname05716eng/982'] | System / ideology; Territory; Resources; International power | System/ideology; Territory; Resources; International power; Third-party intervention / third-party affection | Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine; Russia – Ukraine | Yes / HIIK intensity | HIIK 5 | 0 | null | null | null | null | null | No | null | Not available | Network Denial of Service | Not available | true | Not available | Short-term disruption (< 24h; incident scores 1 point in intensity) | Not available | none | none | 1 | Moderate - high political importance | 1 | Minor | 5 | Day (< 24h) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 0 | null | 0 | Not available | 0 | euro | None/Negligent | Due diligence; Sovereignty | ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.politico.eu/article/french-national-assembly-website-russian-cyberattack-hack-kremlin-emmanuel-macron/?utm_source=RSS_Feed&utm_medium=RSS&utm_campaign=RSS_Syndication', 'https://t.me/noname05716eng/977', 'https://t.me/noname05716eng/982', 'https://twitter.com/MargauxDuguet/status/1640350530009440257?s=20'] |
2,101 | Lockbit ransomware group locked certain computer systems and stole personal information from Washington County Sheriff's Office (WCSO) networks on 21 February 2023 | The Lockbit ransomware group locked certain computer systems and stole personal information from the Washington County Sheriff's Office (WCSO) networks on 21 February 2023, Washington County News first reported on the same day. The ransomware group announced the ransomware attack on its website six days later.
The ransomware attack locked down computer systems related to finance and jail management. Threats by the ransomware group to publish the stolen personal information revealed these also included home addresses, phone numbers, social security numbers, and other personal information of more than 500 employees.
On 21 February, the Washington County sheriff claimed the attackers operated from Russia.
On 28 March 2023, eight days after the deadline for the ransom payment, Lockbit released the stolen data, which was said to be warrants and employee information. | 2023-02-21 | 2023-02-21 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by media (without further information on source); Incident disclosed by authorities of victim state | Data theft & Doxing; Disruption; Hijacking with Misuse; Ransomware | [["Washington County Sheriff's Office (WCSO)"]] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Police']] | ['LockBit'] | ['Not available'] | ['Non-state-group'] | ['Criminal(s)'] | 2 | 2023-02-27; 2023-02-21 | Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media; Direct statement in media report (e.g., Reuters article cites the attribution statements by a person) / self-attribution via social media | Attacker confirms; Attribution by receiver government / state entity | Lockbit; Kevin Crews (Sheriff of Washington County Sheriff's Office, United States) | null | Not available; United States | LockBit; Not available | Not available; Russia | Non-state-group; Unknown - not attributed | Criminal(s); | ['https://washingtoncounty.news/2023/02/21/wcso-under-cyber-attack-tuesday/', 'https://www.redpacketsecurity.com/lockbit-3-0-ransomware-victim-wcso-us/', 'https://washingtoncounty.news/2023/03/02/wcso-nearly-recovered-from-cyber-attack/'] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration; Data Encrypted for Impact | Not available | true | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 6 | Moderate - high political importance | 6 | Medium | 12 | Days (< 7 days) | Major data breach/exfiltration (critical/sensitive information) & data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | null | 0 | euro | None/Negligent | Human rights; Due diligence; Sovereignty | Civic / political rights; ; | Not available | 0 | null | null | null | null | null | Not available | null | Unfriendly acts/retorsions justified (missing state-attribution & breach ofinternational law OR state-attribution & missing breach of international law) | null | ['https://www.databreaches.net/a-listing-on-a-government-victim-disappeared-from-lockbits-site-but-why/', 'https://www.newsbreak.com/washington-county-fl/2963890438373-hackers-threaten-to-release-washington-county-sheriff-s-office-personal-data', 'https://washingtoncounty.news/2023/02/21/wcso-under-cyber-attack-tuesday/', 'https://washingtoncounty.news/2023/03/02/wcso-nearly-recovered-from-cyber-attack/', 'https://www.redpacketsecurity.com/lockbit-3-0-ransomware-victim-wcso-us/', 'https://therecord.media/florida-sheriff-data-leak-lockbit-ransomware', 'https://www.databreaches.net/data-stolen-from-florida-sheriffs-office-leaked-by-lockbit-ransomware-group/', 'https://www.malwarebytes.com/blog/business/2023/04/top-5-cyberthreats-facing-msps-and-vars-in-2023'] |
2,102 | Unknown actors deployed ransomware against the servers of US telecommunications company Lumen Technologies | Unknown actors deployed ransomware against the servers of US telecommunications company Lumen Technologies, the company detailed in a filing to the Securities and Exchange Commission on 27 March 2023.
The ransomware attack degraded hosting services for a small number of the company's customers. | 2023-01-01 | 2023-01-01 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Disruption; Hijacking with Misuse; Ransomware | [['Lumen Technologies']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Telecommunications']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Encrypted for Impact | Not available | true | Not available | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 4 | Moderate - high political importance | 4 | Low | 6 | Days (< 7 days) | No data breach/exfiltration or data corruption (deletion/altering) and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html', 'https://d3ka4b6b7wffw2.cloudfront.net/0000018926/100217360736/4ea1c4d3-54b5-48e9-b56e-d4865d7a8948.pdf'] |
2,103 | Sophisticated intruder accessed internal information of US telecommunications company Lumen Technologies | A sophisticated intruder accessed internal information of US telecommunications company Lumen Technologies, the company disclosed on 27 March 2023 as part of investor notification obligations.
The company specified that only a relatively limited amount of data was exfiltrated. | 2023-01-01 | 2023-01-01 | Attack on critical infrastructure target(s) | null | Incident disclosed by victim | Data theft; Hijacking with Misuse | [['Lumen Technologies']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Telecommunications']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Not available | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 3 | Moderate - high political importance | 3 | Minor | 5 | No system interference/disruption | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html', 'https://d3ka4b6b7wffw2.cloudfront.net/0000018926/100217360736/4ea1c4d3-54b5-48e9-b56e-d4865d7a8948.pdf'] |
2,110 | In August 2022, the US city of Fremont County is attacked by an unknown threat actor with the BlackCat Ransomware | On 17 August 2022, the US city of Fremont County in Colorado discovered that it had been attacked by an unknown threat actor with the BlackCat Ransomware between 13 and 17 August 2022. In doing so, certain files and folders on the servers could no longer be accessed and the threat actor had unauthorised access to certain files. The Fremont County Sheriff's Office wrote on 19 September 2022 that the cyber incident resulted in the loss of access to several of the city's systems. Inmate accounting systems for the sheriff's office also could not be restored, resulting in the loss of all account information. By November 2022, the city's systems were 90 per cent restored. | 2023-08-13 | 2023-08-17 | Attack on (inter alia) political target(s), not politicized | null | Incident disclosed by authorities of victim state | Data theft; Disruption; Hijacking with Misuse; Ransomware | [['Fremont County']] | ['United States'] | [['NATO', 'NORTHAM']] | [['State institutions / political system']] | [['Civil service / administration']] | null | null | null | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 0 | null | null | null | null | null | No | null | Not available | Data Exfiltration | Not available | true | For private / commercial targets: non-sensitive information (incident scores 1 point in intensity) | Long-term disruption (> 24h; incident scores 2 points in intensity) | Hijacking, system misuse, e.g., through data theft and / or disruption (incident scores 2 points in intensity) | none | none | 5 | Moderate - high political importance | 5 | Low | 7 | Days (< 7 days) | Minor data breach/exfiltration (no critical/sensitive information), but no data corruption (deletion/altering) or leaking of data | 1-10 | 0 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | null | null | No response justified (missing state attribution & breach of international law) | null | ['https://fremontcountyco.state.co.us/information-updates', 'https://www.denverpost.com/2022/09/22/wheat-ridge-ransomware-fremont-county-cyber-attack/', 'https://www.cbsnews.com/colorado/news/ransomware-attacks-hit-wheat-ridge-fremont-counties-everything-was-impacted/', 'https://www.govtech.com/security/fremont-county-colo-in-recovery-phase-after-cyber-attack', 'https://www.govtech.com/security/fremont-county-colo-nears-full-capacity-after-cyber-attack', 'https://crimewatch.net/us/co/fremont/sheriff/180579/post/notice-regarding-inmate-accounts?fbclid=IwAR1ybBZcU-etZNtpxBt62ogOeDgxVp5lJP7Iu5Cw4XS0-5zX7RaNZSRZGkk'] |
2,111 | In October 2022, a subcontractor of Centers for Medicare and Medicaid Services in US becomes the target of a ransomware attack | On 14 December 2022, Centers for Medicare and Medicaid Services (CMS) announced that its subcontractor Healthcare Management Solutions (HMS) was the target of a ransomware attack on 8 October 2022. In the process, CMS reported that following an investigation on 18 October, it believed with a high degree of confidence that personal information and protected health information of up to 254,000 Medicare beneficiaries had been compromised, including sensitive banking information. House Committee on Oversight and Accountability Chair James Comer and House Committee on Energy and Commerce Chair Cathy McMorris Rodgers requested documents and communications from CMS Administrator Chiquita Brooks-LaSure in a letter on 20 March 2023, as details were reported only with a two-month delay. Congress was not informed until 1 December 2022, according to Comer and Rodgers, although it is required to be notified within seven days of the discovery of a major cyber incident. | 2022-10-08 | 2022-10-08 | Attack on non-political target(s), politicized | null | Incident disclosed by victim | Data theft | [['Healthcare Management Solutions (HMS)']] | ['United States'] | [['NATO', 'NORTHAM']] | [['Critical infrastructure']] | [['Health']] | ['Not available'] | ['Not available'] | ['Not available'] | null | 1 | null | null | null | null | null | null | null | null | null | null | [] | Unknown | Not available | null | Not available | null | 1 | 2023-03-20 00:00:00 | State Actors: Legislative reactions | Legislative initiative | United States | James Comer (House Committee on Oversight and Accountability Chairman) | No | null | Not available | Data Exfiltration | Not available | false | For private / commercial targets: sensitive information (incident scores 2 points in intensity) | Not available | Not available | none | none | 2 | Moderate - high political importance | 2 | Low | 6 | No system interference/disruption | Data corruption (deletion/altering) but no leaking of data, no data breach/exfiltration OR major data breach / exfiltration, but no data corruption and/or leaking of data | 1-10 | 1 | 1-10 | 1 | Not available | 0 | euro | Not available | Not available | null | Not available | 0 | null | null | null | null | null | Not available | null | No response justified (missing state attribution & breach of international law) | null | ['https://www.databreaches.net/warning-to-seniors-personal-data-of-254k-medicare-beneficiaries-at-risk-after-breach/', 'https://www.cms.gov/newsroom/press-releases/cms-responding-data-breach-subcontractor', 'https://fedscoop.com/cms-subcontractor-data-breach/', 'https://fedscoop.com/cms-subcontractor-breach-timeline/', 'https://d1dth6e84htgma.cloudfront.net/CMS_Data_Breach_Letter_FINAL_f1fb700429.pdf?updated_at=2023-03-20T15:21:59.023Z'] |