• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

City of Oakland Faces Major Data Leak

You are here: Home / General Cyber Security News / City of Oakland Faces Major Data Leak
March 6, 2023

The City of Oakland is bracing by itself just after ransomware actors that breached municipal government networks final thirty day period began releasing the facts they stole.

Metropolis officials introduced a assertion on Friday apologizing for the continued disruption the incident is producing.

“We lately became knowledgeable that an unauthorized third party has acquired sure files from our network and intends to launch the details publicly,” it said.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“We are operating with third-party experts and legislation enforcement on this issue and are actively checking the unauthorized third party’s statements to examine their validity. If we identify that any individual’s personalized information is included, we will notify those people individuals in accordance with relevant law.”

Studies counsel the risk actors, linked with ransomware team Play, have in reality presently begun releasing the stolen information. It’s nonetheless unclear what details was taken, but it is most probably to include city workers’ personalized facts.

The city was compelled to declare a point out of emergency subsequent the preliminary incident previous thirty day period. That enabled it to obtain extra methods from the California Governor’s Place of work of Emergency Services (CalOES), like IT professionals from CalOES and other state departments these as the California Armed forces Department.

They are now nonetheless engaged in “workstation restoration” endeavours, hinting that the ransomware was able to result in considerable hurt.

Though 911 companies ended up unaffected, non-emergency devices were being taken offline after the breach on February 8.

An update on February 28 claimed the city’s OAK311 phone process was back up, as was the allow application program. Even so, at that time the Enterprise Tax On the internet Payments procedure was even now unavailable, and parking citation cashiers ended up not equipped to system payments or obtain phone phone calls.

Specified the disruption the metropolis is enduring and the Engage in group’s choice to leak stolen knowledge, it would show up that Oakland didn’t shell out the ransom demanded of it.


Some pieces of this article are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News UK Government Plans Skills Boost for Public Sector Fraud Fight
Next Post: Experts Reveal Google Cloud Platform’s Blind Spot for Data Exfiltration Attacks experts reveal google cloud platform's blind spot for data exfiltration»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.