Monday, March 17, 2025
HomeCyber AttackRansomware Gang Leaked 600GB of Data Stolen From Oakland City Servers

Ransomware Gang Leaked 600GB of Data Stolen From Oakland City Servers

Published on

SIEM as a Service

Follow Us on Google News

The ransomware gang responsible for the February attack on the City of Oakland, California, released a second data dump. The dump consisted of nearly 600 gigabytes of files that contained stolen municipal data, exposing critical information on thousands of employees in the city.

Play, the threat group responsible for the ransomware attack, posted the second leak on their site, following up with their first data dump at the beginning of March, with Oakland’s data sizing up to 10 gigabytes.

The leak included thousands of former and current city employees and a massive 12 years of city roster. It also had several police misconduct allegations and scanned bank accounts.

Oakland City Hall statement reads, “As a further community update, we recently became aware that the same unauthorized third party claiming responsibility for the ransomware incident has posted additional data allegedly taken from our systems during the incident in February to a website not searchable via the traditional Internet.

Since the attack in February, Oakland has recovered some of the services disrupted during the breach, including its 311 line, which serves as a government contracting portal and online permit application system.

Nevertheless, the attack still affects the City significantly, with the threat group frequently leaking stolen data. In accordance with this second data dump, a union representing Oakland Police Department officers had filed a claim of nearly $25,000 for every police officer whose data had been leaked in the breach.

The association also released a statement accusing city leaders, including Mayor Sheng Thao and City administrator G. Harold Duffey of refusing to answer and hiding the extent of the ransomware attack.

“Oakland city leaders talk about accountability, yet there has been zero accountability and a deafening silence for the safety and financial security of the city’s valued employees. This city is truly broken when city employees learn more about releasing their confidential information from the media than their employer, whose incompetence and sloppy security allows these data breaches to occur.” said Barry Donelan, the association’s president.

Oakland city officials are still investigating this issue and dealing with the clashes between the Officer’s Union and the city leaders. A similar clash between Washington D.C.’s Metropolitan Police Department and the city officials was due to the 2021 data breach incident.

Looking for an all-around patching solution – Try Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light,...

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution

A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information...

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code

A series of vulnerabilities has been discovered in Espressif Systems' ESP32 devices, specifically affecting...

AI Operator Agents Helping Hackers Generate Malicious Code

Symantec's Threat Hunter Team has demonstrated how AI agents like OpenAI's Operator can now...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Kentico Xperience CMS Vulnerability Enables Remote Code Execution

In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light,...

Wazuh SIEM Vulnerability Enables Remote Malicious Code Execution

A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information...

Espressif Systems Flaws Allow Hackers to Execute Arbitrary Code

A series of vulnerabilities has been discovered in Espressif Systems' ESP32 devices, specifically affecting...