Thursday, March 28, 2024

Ransomware Gang Leaked 600GB of Data Stolen From Oakland City Servers

The ransomware gang responsible for the February attack on the City of Oakland, California, released a second data dump. The dump consisted of nearly 600 gigabytes of files that contained stolen municipal data, exposing critical information on thousands of employees in the city.

Play, the threat group responsible for the ransomware attack, posted the second leak on their site, following up with their first data dump at the beginning of March, with Oakland’s data sizing up to 10 gigabytes.

The leak included thousands of former and current city employees and a massive 12 years of city roster. It also had several police misconduct allegations and scanned bank accounts.

Oakland City Hall statement reads, “As a further community update, we recently became aware that the same unauthorized third party claiming responsibility for the ransomware incident has posted additional data allegedly taken from our systems during the incident in February to a website not searchable via the traditional Internet.

Since the attack in February, Oakland has recovered some of the services disrupted during the breach, including its 311 line, which serves as a government contracting portal and online permit application system.

Nevertheless, the attack still affects the City significantly, with the threat group frequently leaking stolen data. In accordance with this second data dump, a union representing Oakland Police Department officers had filed a claim of nearly $25,000 for every police officer whose data had been leaked in the breach.

The association also released a statement accusing city leaders, including Mayor Sheng Thao and City administrator G. Harold Duffey of refusing to answer and hiding the extent of the ransomware attack.

“Oakland city leaders talk about accountability, yet there has been zero accountability and a deafening silence for the safety and financial security of the city’s valued employees. This city is truly broken when city employees learn more about releasing their confidential information from the media than their employer, whose incompetence and sloppy security allows these data breaches to occur.” said Barry Donelan, the association’s president.

Oakland city officials are still investigating this issue and dealing with the clashes between the Officer’s Union and the city leaders. A similar clash between Washington D.C.’s Metropolitan Police Department and the city officials was due to the 2021 data breach incident.

Looking for an all-around patching solution – Try Patch Manager Plus

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles