Hackers have stolen information from a Salford-primarily based social housing team that properties thousands of tenants and other clients.
ForHousing and Liberty, which manages and maintains households throughout the North West, had been reportedly victims of a ransomware attack. The team confirmed that no details of tenants or staff members had been accessed, but a ‘small amount’ of info was compromised, which resulted in the systems being taken offline as a precautionary measure.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Ransomware is a kind of malware that employs encryption to steal a victim’s info at ransom. The information is encrypted so files, databases or programs are not able to be accessed.
Ray Jones, group controlling director of Liberty, claimed the investigations in the incident have now finished. He mentioned, “We can ensure that a modest amount of information was compromised through the incident.
“We have liaised with the related authorities, and are at present performing closely with any of our associates who have been afflicted to allow for them to be added vigilant.”
ForHousing and Liberty are aspect of the ForViva group, centered in Eccles.
ForViva team CEO Colette McKune reported, “Tenant and team security is our priority and this features the security and integrity of their data.”
“We have informed tenants about this incident and verified that their data is safe and sound.”
Other housing associations have been attacked a short while ago. In November 2020, a housing affiliation in East Anglia was strike by a ransomware attack. The attack compelled Flagship Team to choose its IT techniques offline just after the Sodinokibi strain entered the corporation by way of a phishing attack.
Some components of this short article are sourced from:
www.infosecurity-journal.com