At a glance.
- Averly breach exposes tenant data.
- AvosLocker strikes again.
- Canadian local government data dumped on dark web.
Averly breach exposes tenant data.
South African real estate platform Averly has disclosed that it suffered a customer data breach earlier this month when the third-party vendor that hosts the site’s database was hit with a ransomware attack, My Broadband reports. The compromised data includes tenant names, email addresses, ID numbers, residential addresses, and login information for Averly’s Tenant Profile Network (TPN), designed to help real estate agents and landlords identify desirable tenants. “At this stage of the investigation, it is unclear whether the threat actor is in possession of the personal information they accessed unlawfully,” Averly stated. The perpetrator has not yet been identified, but an investigation is underway, and in the meantime, the company has severed ties with the third-party vendor, replacing the compromised database with a new version in an independent hosting environment.
AvosLocker strikes again.
Ransomware gang AvosLocker has taken credit for the recent attack of CHRISTUS Health, a nonprofit Catholic health system based out of the US state of Texas. The prolific threat group has hit more than fifty organizations around the world, and its activities made it the subject of a recent joint alert issued by the US Federal Bureau of Investigation and Treasury Department. This is the group’s second attack on a US health institution in as many months, as the group targeted Michigan-based McKenzie Health System in March. The company did not identify the attacker, but AvosLocker posted stolen McKenzie data to its dark web leak site April 6. CHRISTUS, which operates more than six hundred facilities across the US, Mexico, Chile, and Colombia, told CyberScoop that the organization detected the unauthorized intrusion earlier this month, and that fortunately the attack did not disrupt patient care.
Canadian local government data dumped on dark web.
In April, officials were forced to shut down the website and email system of Elgin County, located in Ontario, Canada, after a “cybersecurity incident.” Though the networks were restored on April 27th, just days later officials learned that stolen data, including personal info belonging to over three hundred county employees and residents, had been published on the dark web. An investigation is ongoing, and though details about the precipitating incident are unclear, Elgin’s chief administrative officer Julie Gonyou told Ifpress it did not appear to be a “ransomware attack.” For thirty-three of the compromised individuals, the data exposed includes sensitive info like health card numbers, social insurance numbers, and financial information. Gonyou added, “We’ve long had robust security measures in place. But (with) cyber-criminals and those individuals who are undertaking these types of targeted attacks, their tactics are evolving constantly.”